Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:35
Static task
static1
Behavioral task
behavioral1
Sample
f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe
Resource
win7-20241023-en
General
-
Target
f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe
-
Size
1.0MB
-
MD5
9d73b42ce002d0964ac552c4a8be3652
-
SHA1
86942687836cc75e082399acafefcf17f40c6606
-
SHA256
f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70
-
SHA512
4d768f775e56ca96898657d908c062056f94c69e8765bec277df6c5f9f359446771c17988488836c7e7c281200ced151983e1b690161bd60ff9f2394715889d0
-
SSDEEP
12288:Wx76RAQOEhGkEHIxZEfzZXbpC+MRxkhxSU739+MAC80dRXXr3SONMTW2KgcYM8+M:YadgVOExA+LQG2CpzXXrNns
Malware Config
Extracted
xloader
2.5
nbm3
3881a.com
abutuandui.com
halo-airs.com
nu865ci.com
fssqyd.com
pacificsunseattle.com
sellyourfobs.com
eniso-team.com
ciscenjedpffiltera.com
furriekids.com
dspotsg.com
amanispartydecor.com
wrih.top
rab-verlopen-pas.icu
alircep.com
rangeroads.com
bugattiveyronhypercarnft.com
dominera.net
jux565.com
licenseoriginal.com
theseasonedsnacker.com
espace-futur.com
danette.xyz
hardayumangosteen.com
devapplab.com
kondz.com
suddennnnnnnnnnnn37.xyz
blackflagholdings.com
startuitive.com
helpforhospo.com
techstartups.info
china-ycgw.com
custsupport-louisvuitton.com
hungstore3.asia
cookinkele.com
sasharose.com
usaonlinedrs.com
accollectibles.net
tslsinteligentes.com
jorgeknowshomes.com
xaydungvihouse.com
u0biitep9.xyz
roplseason.com
nanren0722.com
helperdating.com
648871.com
shamta.net
indianpharmacymedical.com
trfcshl.com
myhelpstationorlando.com
originalpluss.com
eksklusifinvestment.com
bringmovies.com
mofankeji.online
rubotic.net
kenkaneki.tech
ratliffroots.com
cryptopricescam.com
samedaycash.loan
buildlaoc.com
pipandelli.com
livemarkt.com
tetupo.com
faicai.club
venarypad.quest
Signatures
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe -
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1720-9-0x0000000000400000-0x0000000000431000-memory.dmp xloader behavioral2/memory/1720-12-0x0000000000400000-0x0000000000431000-memory.dmp xloader behavioral2/memory/2064-19-0x0000000000B40000-0x0000000000B69000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4816 set thread context of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 1720 set thread context of 3412 1720 DevicePairingWizard.exe 56 PID 2064 set thread context of 3412 2064 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DevicePairingWizard.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 1720 DevicePairingWizard.exe 1720 DevicePairingWizard.exe 1720 DevicePairingWizard.exe 1720 DevicePairingWizard.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe 2064 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1720 DevicePairingWizard.exe 1720 DevicePairingWizard.exe 1720 DevicePairingWizard.exe 2064 msdt.exe 2064 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe Token: SeDebugPrivilege 1720 DevicePairingWizard.exe Token: SeDebugPrivilege 2064 msdt.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 4816 wrote to memory of 1720 4816 f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe 83 PID 3412 wrote to memory of 2064 3412 Explorer.EXE 84 PID 3412 wrote to memory of 2064 3412 Explorer.EXE 84 PID 3412 wrote to memory of 2064 3412 Explorer.EXE 84 PID 2064 wrote to memory of 4664 2064 msdt.exe 89 PID 2064 wrote to memory of 4664 2064 msdt.exe 89 PID 2064 wrote to memory of 4664 2064 msdt.exe 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3412 -
C:\Users\Admin\AppData\Local\Temp\f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe"C:\Users\Admin\AppData\Local\Temp\f5627afaa1bd709c0472ba296cf90e93f743d58959461eec26ba7b62e7486c70.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\DevicePairingWizard.exe"C:\Windows\SysWOW64\DevicePairingWizard.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1720
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\DevicePairingWizard.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4664
-
-