Analysis
-
max time kernel
46s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe
Resource
win7-20241010-en
General
-
Target
61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe
-
Size
523KB
-
MD5
0a5203e9b9b75f2c840989cf846a3cc5
-
SHA1
06720790a4728ad08530373117a10e2769d6833e
-
SHA256
61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3
-
SHA512
407f8e7826da334346c4d474e884aebdd0618390aaf7de12e96112acd05e74d7546d69cd5b59781145f0d57450442fb1e98ba032db115adcaf997172c18e5a59
-
SSDEEP
12288:uMNfJRiS6pxyynOiptzBsri2Lsg84uSB:usudXQiCri24V4zB
Malware Config
Extracted
xloader
2.5
mc6b
packyssportsbarandgrill.com
catherinemata.com
swooningheartsenterprises.com
miss-notary86.com
applianceson.website
investormonks.online
lootproject.art
adoletakids.com
searchlink7.com
msjoyjewelsunlimited.com
dannisdolls.online
premierpor.xyz
geceseks.com
camdaw.xyz
ditrixmed.store
yotosunny.com
asdeformar.com
lacofood.com
nu865ci.com
verdantgomkte.xyz
bqric.com
answersystems-of-texas.com
obsessedwellness.com
herbalmedication.xyz
residemortgage.net
oruncorp.com
temeculasaints.com
feierabendshop.com
freeflowinitiative.com
inslidr.com
yhw86.com
dsrubicklon.com
xn--adcardpannage75-gnb.com
shopsalez.com
refaccioneselprimo.top
bay-frame.com
atiyehazaraein.com
memepaslhiver.com
ronas.top
schnurrstudio.com
aufablog.com
ruptuer.com
theplaintalker.net
greencrowns.net
archipelagos-labs.com
vitalflowscam.com
tenloe034.xyz
n0d.net
centelytics.com
sixfigureanalytics.com
monochromea.com
buyexcessinventory.com
ord12route.art
cursosparaavida.com
zhxinniang.com
localhuktoyof4.xyz
bcaslot88.com
raqsrecords.com
bestofomaha.info
geschauctions.xyz
fix4seo.com
saveescape.net
fizzlebu.net
tatteredfly.com
orderinformantmailer.site
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2376-7-0x00000000004C0000-0x00000000004E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2376 set thread context of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2792 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29 PID 2376 wrote to memory of 2792 2376 61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe"C:\Users\Admin\AppData\Local\Temp\61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe"C:\Users\Admin\AppData\Local\Temp\61513e3002d53144e302a97f62382f19e9e4fbd3c820c1e0000cc793a5b7a2d3.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2792
-