Analysis
-
max time kernel
92s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe
Resource
win7-20240903-en
General
-
Target
8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe
-
Size
1.1MB
-
MD5
79696e14b286ae152091d0090b7c0105
-
SHA1
510a8bbeefe8d4407f9e032ffd3438be22f280ca
-
SHA256
8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633
-
SHA512
b3cd13482dd7bad3b35b274244f139d6801d263ce7e2a46fb6f3774b7a05db03349630df8e6fd578f74e349513d95c16b63d0d15d5ccda1e7db08018790a6087
-
SSDEEP
24576:iW93G9psFtc0ZlaSZOTTSNdOc+SqWKVyxqwVdLCIQ6a:Z3iM/Zla2KSNdOLyxxdZha
Malware Config
Extracted
xloader
2.5
nug3
movinggameplans.net
sunrisetillsunuptow.com
vessaifeilde.quest
ov294.com
baobabbijoux.com
startuitive.com
sharj4030.online
neogenesivenice.com
timopartanen.com
julianaeclarindo.com
xbtiyu.com
tile666.com
hmgame668.com
johnfletcherllc.com
lingkarlengan.com
fdiqw.com
pathsat.sbs
age-oldpklduy.xyz
0876jz.com
misight1day.lat
rgbc.group
fayastix.com
xianganbao.com
deals4me.store
fame-home.com
ceruletower.com
yhm9r.online
tmongpil.com
barnane.com
abilityplace.agency
hdmovietrailers.net
lynxvms.com
nobt.top
ease-dev-core.com
care-location-map.xyz
jrioetuiojkv.store
sapotore.com
zekibasriestate.com
52juns.com
stilllifecoffee.com
bagour.com
ourgreendiary.com
fullnatura.com
silksoftmilkofgoat.xyz
helpdeskadmin.biz
myarhaus.com
gogoma3.com
gevewayy.xyz
jiaxiang39.com
twinix.info
karamrentacar.com
logisticsolved.com
xn--4gqyn781iuoq.xyz
dewyskins.com
tipmoderna.com
solanapiranhas.com
larssonfurniture.com
mrkmj.com
shopchristmaswreath.com
chek-enterprises.com
schematiques.com
orderinformantmailer.online
ashainitiativemp.com
balanzasdeplataformalima.com
switips.club
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2660-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4200 set thread context of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2660 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 2660 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4200 wrote to memory of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99 PID 4200 wrote to memory of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99 PID 4200 wrote to memory of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99 PID 4200 wrote to memory of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99 PID 4200 wrote to memory of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99 PID 4200 wrote to memory of 2660 4200 8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe"C:\Users\Admin\AppData\Local\Temp\8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Users\Admin\AppData\Local\Temp\8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe"C:\Users\Admin\AppData\Local\Temp\8f7d7d1a049ec6dc888d93c883c89701febe96cc0749608627e9ea3131f9e633.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2660
-