Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe
Resource
win7-20240903-en
General
-
Target
d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe
-
Size
877KB
-
MD5
79a8396afa4bafa7fa10abf4d9742460
-
SHA1
0b44500dc9152a7fa8a26243e240e63a46097d41
-
SHA256
d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b
-
SHA512
8b24ff09b77cb0bf7c8cfde7cbcf3c285370e7390452dc2dfeba18d588a93c17ed3196b61e3d9a58bf3fdc4bf136a38910b09af83523ceea0fbf28277e8631c0
-
SSDEEP
12288:wgEf1smrkBTZsJwO80kgSxeZgitF1McwLVmadIdzZjOUv0wOf3gq8jqGJ5g7d6D3:UzrvJw6k1xIEpRazBd1sjE5g7d0Cq
Malware Config
Extracted
xloader
2.5
shbc
ccee77.com
rkfb11.website
dhanwantarifirstaid.com
lindakmiller.store
cedarparkproperty.com
one9online.com
universecells.com
spanshlifepace.com
eternityprivatewealth.com
rocknripple.com
lk-safe-keepingtoyof6.xyz
settacorp.com
bhy8.com
hxkpcom.com
woyaobudan8.com
geleisi168.com
movilitatelectrica.com
jhesuveels.quest
nijigenutopia.com
odlublina.xyz
fujisancojp.com
prospectly.services
origincoaches.com
niftyhashmasks.com
professionalsbroadbeach.com
ncgf50.xyz
modifiers.online
clickonline.website
dollarball.club
rotaryclubvaranasi.com
everybunnyeverybirdy.com
zarinafzar.com
poolvillacity.com
brianclamsonconstruction.com
wraffle.win
86oo.com
nifaji.com
hpmetaverse.com
flyingjalapenosoftware.com
repressqlxoms.online
kingsignpalace.com
ksfhbu.biz
stephaniebethmarkel.com
detoju.net
chilliebl.xyz
distinctivesport.com
ovvorta.com
bchantbank.com
taro10826.com
blasconsultoresg.com
prisonnurselife.com
lahdeyrittajaksi.com
nonrealnamenaver.com
oshsandst.one
flowstarak.com
koreaservice.pro
junnuoup.com
augsburgtag.com
amazonwisely.com
7777wns.com
bxbeans.com
windyboxingstore.com
anynft.net
birbes1851.com
spoonandstone.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2744-23-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 4488 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\International\Geo\Nation d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3656 set thread context of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1212 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 4488 powershell.exe 2744 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 2744 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 4488 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe Token: SeDebugPrivilege 4488 powershell.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3656 wrote to memory of 4488 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 100 PID 3656 wrote to memory of 4488 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 100 PID 3656 wrote to memory of 4488 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 100 PID 3656 wrote to memory of 1212 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 102 PID 3656 wrote to memory of 1212 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 102 PID 3656 wrote to memory of 1212 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 102 PID 3656 wrote to memory of 1904 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 104 PID 3656 wrote to memory of 1904 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 104 PID 3656 wrote to memory of 1904 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 104 PID 3656 wrote to memory of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105 PID 3656 wrote to memory of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105 PID 3656 wrote to memory of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105 PID 3656 wrote to memory of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105 PID 3656 wrote to memory of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105 PID 3656 wrote to memory of 2744 3656 d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe"C:\Users\Admin\AppData\Local\Temp\d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe"1⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3656 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ZmwVUlufxBPsEC.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4488
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZmwVUlufxBPsEC" /XML "C:\Users\Admin\AppData\Local\Temp\tmp39F7.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe"C:\Users\Admin\AppData\Local\Temp\d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe"2⤵PID:1904
-
-
C:\Users\Admin\AppData\Local\Temp\d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe"C:\Users\Admin\AppData\Local\Temp\d080ca9f39e30376eebb0d8a0c171ef29f24b5d3aa3b7c7f5ff35f6af9d67b1b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2744
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5ced8663cebbfcfb885404c47a87f0978
SHA1fa4c7c94f00c893d8506ea73598cfbf716e974fe
SHA256968a73fc3e94167f4de97a16509e7a3b1a2989574e236d89ae7f2d06a5a54b97
SHA512f7074bcedf43d3d36cc45f1f65a7d4efb103ef6f93e03ec5a3f730559bc401fdcde39c356044c97c1832c32618a386268cc009ec448faa1b239fd99e80e3fa00