Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
ab.exe
Resource
win7-20240903-en
General
-
Target
ab.exe
-
Size
438KB
-
MD5
ec5f47fe4a35107c14c9837b1737e7d9
-
SHA1
fd6070cd7662568cfc1e9f6451cd4a30f866b62e
-
SHA256
97710e37b088b72c870ceb2a4c03a04625f800a83549ed4537dc64893fc33587
-
SHA512
efb918a8368689df3aa259939a7208febd12ec26f928a0d452fd39dd06a5dec3a6e9265de2acaa49a9092ad6da8c18d30292637f870d14bdbec4e547f2d42337
-
SSDEEP
6144:ttVixIMpYEEsD5S5OMykMS4vk2VuKDMP9N1bIyu0TFxYVYQXV4bfxZpHVWKl5azI:fhE7DUmvRSIyuEFxISZZpHVWKrazcl9
Malware Config
Extracted
xloader
2.3
xfts
dailiesplatform.com
krlanka.com
koms.info
chesslearner.com
softwarefully.com
yogiplayground.com
learhee.com
faithbook.info
pepperrefo.com
kratochvil-elektro.com
artbyg2.com
123-e.com
levelupyourbody.info
ecommercebusinessowner.com
floraseriestrilogy.com
sdyykt.com
swchof.com
huaxinhui.tech
sems-iress2016.com
vasudhalibrary.com
chummakizhi.com
gosleep-vietnam.com
plafon.one
sneakyhenry.com
x1699.com
flora4me.com
goofballtheclown.com
luckysevenboxesdesign.com
bioseefit-genuine.com
rjuanca.com
projectorcity.net
sustainablemedia.global
autoimmuneanswers.net
lessismoreee.com
xn--80aabjg7ciie7f.xn--p1acf
yourmoneyfuther.com
theatricsvirtual.com
appalachianholisticdentist.com
blaxies3.com
partycc.com
for-all-dream.com
szrhyl.com
databolism.com
loyalimportados.com
burnvioletinternational.com
graceinperspective.life
artsandfoodnyc.recipes
design4sys.com
medicalscreech.life
seeyouseeme.net
cernerarchive.net
ketamineinfusioncalgary.com
leagueofconsciouscreatives.com
triggerfishgroup.com
de-la-platiada.info
whatsmycurrency.com
stainset.com
museanimations.com
vip-5.com
corollabeachsetups.com
arcpest.com
kusamac.com
mustaphaswinga.com
dofreemovies.com
shhxqg.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2864-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2864-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2864-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2936-26-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1984 set thread context of 2864 1984 ab.exe 31 PID 2864 set thread context of 1192 2864 ab.exe 21 PID 2864 set thread context of 1192 2864 ab.exe 21 PID 2936 set thread context of 1192 2936 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ab.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 1984 ab.exe 1984 ab.exe 1984 ab.exe 2864 ab.exe 2864 ab.exe 2864 ab.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe 2936 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2864 ab.exe 2864 ab.exe 2864 ab.exe 2864 ab.exe 2936 explorer.exe 2936 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1984 ab.exe Token: SeDebugPrivilege 2864 ab.exe Token: SeDebugPrivilege 2936 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1984 wrote to memory of 2864 1984 ab.exe 31 PID 1192 wrote to memory of 2936 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2936 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2936 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2936 1192 Explorer.EXE 32 PID 2936 wrote to memory of 2660 2936 explorer.exe 33 PID 2936 wrote to memory of 2660 2936 explorer.exe 33 PID 2936 wrote to memory of 2660 2936 explorer.exe 33 PID 2936 wrote to memory of 2660 2936 explorer.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\ab.exe"C:\Users\Admin\AppData\Local\Temp\ab.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\ab.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2864
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ab.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2660
-
-