Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ekow.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ekow.dll
Resource
win10v2004-20241007-en
General
-
Target
b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe
-
Size
470KB
-
MD5
b3dfff5713cd5c14b318b5e8d03f165f
-
SHA1
1086c8695b1475bdefced78b602fab5c684e03e6
-
SHA256
b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b
-
SHA512
690768d0fe8ec516530df185dd263097ad3657673c21bd3d7547f90b9061443bd650ff88336b162612390705b9364666e4192c081a465d138ad2239489889cbb
-
SSDEEP
6144:NwW3I/rWDFjbLMLzAckNiycbOTVnxkPuN/iK0AistrocL2JUzjFdIOha:L3IrWDV6z+cbOjOuxiIVrbL6aJa
Malware Config
Extracted
xloader
2.5
quc5
writerpilotpublishing.com
journeywands.com
madacambo.com
boreslirealestate.com
drillshear.com
urbanmastic.com
focalbunk.com
ghpgroupinc.xyz
rfgmhnvf.com
241mk.com
mandolinzen.com
thenorthstarbets.com
oggperformancehorses.com
webuywholesalerhouses.com
cinreyyy.com
theyoungwedding.com
neuro-ai-web-ru.digital
zavienniky.xyz
kin-school.com
lowratepersonalloans.com
reddindesignco.com
w-planning21.com
contactcenter2.email
bizarrefuid.com
pngok.net
trasportocargo.com
litecoinpricescam.com
klovaperon.quest
ericpcensi.com
gra68.net
bmsr.mobi
phukienstreaming.com
spojed.store
gesips.com
andrewarchitect.com
sifangktv.info
xd16880.com
tudineroenvenezuela.com
scakw.com
sittingysxtfy.xyz
suckit-ice.com
spryget.com
servionexpress.com
dobuncou.xyz
williswear.com
alvinceremiaam.xyz
kashmanltd.com
thebeautydisruptor.com
sherrilyndale.com
edn-by-fges.net
megaverse.estate
albatrosstextile.com
isabel-mirandol.com
jaawo.com
digitalrajputsamaj.com
capital11.store
bortovoycomputezzerkalo.online
tamankertamukti.com
targethic.tech
1006e.com
sahin.business
gosecure.info
spasalonsuite.com
kasko-sigorta.com
augiesautopainting.com
Signatures
-
Xloader family
-
Xloader payload 5 IoCs
resource yara_rule behavioral1/memory/320-12-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/320-10-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/320-13-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/320-14-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/320-15-0x0000000004470000-0x0000000004499000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2360 set thread context of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1028 320 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 2360 wrote to memory of 320 2360 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 31 PID 320 wrote to memory of 1028 320 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 32 PID 320 wrote to memory of 1028 320 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 32 PID 320 wrote to memory of 1028 320 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 32 PID 320 wrote to memory of 1028 320 b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe"C:\Users\Admin\AppData\Local\Temp\b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe"C:\Users\Admin\AppData\Local\Temp\b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 320 -s 5203⤵
- Program crash
PID:1028
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
18KB
MD54255f992dca6609afe2290b6e31d7e7b
SHA1462ebc74c1078dc04460d4e0403a8adf74d11adb
SHA256f774b50cdcf20dbf9515d6051776e4d7fb7ca4afd2ddb60028d72510f7575a7f
SHA51252ab06e60955cd56e0c15fbcb571f0e08ca96038322e87a4938e9701e1f23a1b52b1286f189c92b564cca38e1371ed181c99d2bdee092dabd3341b42304e0006