Analysis
-
max time kernel
146s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
cznfe.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
cznfe.exe
Resource
win10v2004-20241007-en
General
-
Target
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
-
Size
292KB
-
MD5
be6ece1b6510c986870d8ceabb87988b
-
SHA1
63795ce8b9c7fd5ec3374e3e012b3898a8695f53
-
SHA256
b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f
-
SHA512
c7296be4cf5c14ada776312ceeedd29b52b6e4e228e6f1453e5485571099f6c517e90c6f33b88835b51130056bca6d2401d1bd6aed7e0b9d590d3b7b2c60a334
-
SSDEEP
6144:oweQYmMhY6ydhGhzXu2UDOyDSWwDrW12P4v2B/Bd66R6DWV:6QYNILOzWwDrWsg2JBxR6DWV
Malware Config
Extracted
xloader
2.5
p2a5
gorillaslovebananas.com
zonaextasis.com
digitalpravin.online
memorialdoors.com
departmenteindhoven.com
vipulb.com
ruyibao365.com
ynpzz.com
matthewandjessica.com
winfrey2024.com
janetride.com
arairazur.xyz
alltheheads.com
amayawebdesigns.com
califunder.com
blacksource.xyz
farmasi.agency
ilmkibahar.com
thinkcentury.net
eskortclub.com
trc-clicks.com
negc-inc.com
knightfy.com
rentalsinkendall.com
semikron1688.com
755xy.xyz
primespot-shop.com
securetravel.group
luxehairbyjen.com
augpropertygroup.com
xinlishiqiaoqiao.xyz
naggingvmkqmn.online
pynch2.com
awarco.net
booyademy.com
244.house
574761.com
haoshanzhai.com
dubaiforlife.com
acidiccatlsd.com
amotekuntv.com
runfreeco.com
iamaka.net
599-63rdstreet.com
cakeshares.com
evengl.com
joinlever.com
cyberaised.online
genrage.com
walterjliveharder.com
northbayavs.com
spajoo.com
ypkp-com37qq.com
dautucamlam.com
installslostp.xyz
bisbenefits.solutions
espchange.com
exteches.com
utilitytrace.com
468max.com
835391.com
shoptomst.com
pingerton.online
avpxshnibd.mobi
cupboarddi.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2748-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2748-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2272-23-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2752 cznfe.exe 2748 cznfe.exe -
Loads dropped DLL 2 IoCs
pid Process 2660 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 2752 cznfe.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2752 set thread context of 2748 2752 cznfe.exe 31 PID 2748 set thread context of 1184 2748 cznfe.exe 21 PID 2272 set thread context of 1184 2272 wininit.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cznfe.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2748 cznfe.exe 2748 cznfe.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe 2272 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2748 cznfe.exe 2748 cznfe.exe 2748 cznfe.exe 2272 wininit.exe 2272 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2748 cznfe.exe Token: SeDebugPrivilege 2272 wininit.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2660 wrote to memory of 2752 2660 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 30 PID 2660 wrote to memory of 2752 2660 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 30 PID 2660 wrote to memory of 2752 2660 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 30 PID 2660 wrote to memory of 2752 2660 b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe 30 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 2752 wrote to memory of 2748 2752 cznfe.exe 31 PID 1184 wrote to memory of 2272 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2272 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2272 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2272 1184 Explorer.EXE 32 PID 2272 wrote to memory of 2580 2272 wininit.exe 33 PID 2272 wrote to memory of 2580 2272 wininit.exe 33 PID 2272 wrote to memory of 2580 2272 wininit.exe 33 PID 2272 wrote to memory of 2580 2272 wininit.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe"C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\cznfe.exeC:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\cznfe.exeC:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\cznfe.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5c991010927a0003b352fe645f53122da
SHA1282c97fcd98de42ffad1879d51f62e711fb2d0d2
SHA25605201a873aaed950ff031f861daf6fcd1bc23345458fa9152b9486731ddbfca9
SHA512c0f6c9e121f81c95164326f36c2f5e587b5b1d30801400bafcb39f98fa0274ccdf0a0d3f888053f0929a7998850384fb0910924a82c83ce949893c5743cf7008
-
Filesize
4KB
MD59a6b34eb6752b9ece6f47081f02565c4
SHA1b7a73450048bbcde6953886f3d7b177e2434ea0d
SHA256274d7ddab57e4caf3fca959b4b5c8a2842fe68196593f0aa7453855cf9e20242
SHA512edc1baf7792d8e88a61d397173fb84e5e3f36cf738020a6e8557462c6def570c541e371cd289ff4f0704d08697aa01476aad8bcfc8e7e11c5fa0b1d8602efe2a
-
Filesize
120KB
MD53464aade4cb916d733fdd606c3d70165
SHA10c47d2c2d6a12cb78275f0d9b3190b1aad04805b
SHA256a1b617196797fb690647c6f4f0329be8087bdaf222bdbe8bcd762ebb619e5ad2
SHA512a4c01810521414aa8ca7757fae35f8710f37d109360d240483063dd22db3e94e32cf9819022e4e1d7b3ee7845fa635bd9417645beb99b400bf3f8e93cafbfbeb