Analysis
-
max time kernel
45s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe
Resource
win7-20241010-en
General
-
Target
3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe
-
Size
1.2MB
-
MD5
2875b6d653a9311f91e1a2f28e5538e1
-
SHA1
6f13158f25a54b1631ce935f90db7e3daaf4257f
-
SHA256
3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff
-
SHA512
6849621b598210ead54cfff112f0f0d571f0caf72cca48349b4471817a567ff83b134e302011fda84a8421337961a6b5d25bda8d528da54451a329dec1ac7b85
-
SSDEEP
24576:PSWnZPFYyblhB2PLKuUSxztfzvYIDWrWdT:ryK12D7DxpfzgHrW
Malware Config
Extracted
xloader
2.3
6mam
gxduoke.com
lawmetricssolicitors.com
e-bizbox.com
ilovemehoodie.com
marcuslafond.com
bransolute.com
kuppers.info
kykyryky.art
vavasoo.com
tlamj.com
besport24.com
hibachiexpressnctogo.com
elglink99.com
maximos.world
uniamaa.com
aladinfarma.com
opticatervisof.com
delhibudokankarate.com
juliekifyukstyle.com
fuzhourexian.com
qvcrx.com
trendyheld.com
hanasugisaki.com
mylifeinpark.com
importexportasia.com
paypalticket5396173.info
threatprotection.net
mayartpaints.com
miamiqueensdress.com
designtomade.com
apacshift.support
candlewooddmc.com
riveraitc.com
adenxsdesign.com
fanbase.fan
beastninjas.com
shkanghong.com
f9fui8.xyz
bgpetty.com
ryderevanrobisonstudio.com
dragonshipping.com
schoolfrontoffice.com
mypursuitpodcast.com
moneyfollowsaction.com
blueline-productions.co.uk
munnarorganics.com
bagyat.com
scientiaxliv.com
genesysshop.com
freehypnosisevent.com
amazebrowser.com
coicplat.com
annettebrownlee.com
hangrylocal.com
titanusedcarsworth.com
geekotronic.com
microwgreens.com
cannamalism.com
at-academy.com
envirotechpropertiesltd.com
ramseybusinessinstitute.info
sublos.com
kilbyrnefarm.com
expressnailsspa.com
mobiessence.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2772-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2808 set thread context of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2772 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29 PID 2808 wrote to memory of 2772 2808 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2772
-