Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe
Resource
win7-20240903-en
General
-
Target
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe
-
Size
1.0MB
-
MD5
5e65687e6dfe0d3b02757fecea0b130a
-
SHA1
27fef89564b277da09f18bbdc9215c65b1ee729e
-
SHA256
f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f
-
SHA512
4388eba08207189a816c5eb2b09776186c48aa02ba1407c4108a6548d29f1562184beca49c6d2de65510af89f831bec23465f189f336d6bbadc3ff5addd194a0
-
SSDEEP
12288:DGwxGil6fbZkSIl7ganNp5EjMLFIUSr17nyNcWp1SG/23FGva5nlFhZ/Mv4I8PQf:DlNktkSm7ganNp5S0ps3par7LOvlWp
Malware Config
Extracted
xloader
2.5
i9ng
guiadesfralde.online
asjcjm.com
peacefmradio.com
pastasteakandpancake.online
imas-millionlive.com
ori-key.com
emissiontestrepair.com
education-mentor.online
axieinfinity-airdrop.club
iphone13pro.photos
grjeht033.store
plainfiles.com
texasinjurytriallawyers.com
votebrenthagenbuch.com
xn--crahome-cya.com
lquzd.com
anwoguoji.com
tacdating.com
shop-mr.com
pandrwatch.store
horai-chr.com
crowddust.com
contemporarywritings.com
elenahervecaro.com
fjpinrui.com
lesswax.com
sibtest.online
degitalcrime.com
inputflair.com
folge-meinempaket-de.com
mancaoxijing.com
poojafuels.com
seeandbeyourfuture.com
myarhaus.com
samas.store
burntheshipre.com
theherdsherpa.com
timesmarketing360.com
jochenhendrich.net
erisearch.com
mathewdartbassoon.com
xiaolt.top
984561.com
thevegie.com
wrtink.com
khazafna.com
gacor-terus-tiap-hari.xyz
bestconejohomes.com
goldentigre.online
cesiesis.com
credits-suiisse.com
texasmotorcycletransport.com
ascensionsresumes.com
zelestialcosmetics.com
corporativogrupomg.com
ovth-cksu.com
coronarycoach.com
vvv-btk.info
precisionsfittings.com
7890156.com
themidnightgospel.com
algurg-living.com
flores3x1.net
fanshu.space
tprs.club
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2812-13-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/2812-9-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/2812-16-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral1/memory/2740-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2672 set thread context of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2812 set thread context of 1256 2812 taskkill.exe 21 PID 2740 set thread context of 1256 2740 raserver.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language taskkill.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Kills process with taskkill 1 IoCs
pid Process 2812 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 41 IoCs
pid Process 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2812 taskkill.exe 2812 taskkill.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe 2740 raserver.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2812 taskkill.exe 2812 taskkill.exe 2812 taskkill.exe 2740 raserver.exe 2740 raserver.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe Token: SeDebugPrivilege 2812 taskkill.exe Token: SeDebugPrivilege 2740 raserver.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 2672 wrote to memory of 2812 2672 f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe 31 PID 1256 wrote to memory of 2740 1256 Explorer.EXE 32 PID 1256 wrote to memory of 2740 1256 Explorer.EXE 32 PID 1256 wrote to memory of 2740 1256 Explorer.EXE 32 PID 1256 wrote to memory of 2740 1256 Explorer.EXE 32 PID 2740 wrote to memory of 2600 2740 raserver.exe 33 PID 2740 wrote to memory of 2600 2740 raserver.exe 33 PID 2740 wrote to memory of 2600 2740 raserver.exe 33 PID 2740 wrote to memory of 2600 2740 raserver.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe"C:\Users\Admin\AppData\Local\Temp\f7c8388b7b9d110dc7f4a72fe5d7477a8dbd0e1731fd04bee8c6c5f7bd26540f.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\SysWOW64\taskkill.exe"C:\Windows\SysWOW64\taskkill.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Kills process with taskkill
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2812
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\taskkill.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2600
-
-