Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:36
Static task
static1
Behavioral task
behavioral1
Sample
3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe
Resource
win7-20241010-en
General
-
Target
3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe
-
Size
1.2MB
-
MD5
2875b6d653a9311f91e1a2f28e5538e1
-
SHA1
6f13158f25a54b1631ce935f90db7e3daaf4257f
-
SHA256
3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff
-
SHA512
6849621b598210ead54cfff112f0f0d571f0caf72cca48349b4471817a567ff83b134e302011fda84a8421337961a6b5d25bda8d528da54451a329dec1ac7b85
-
SSDEEP
24576:PSWnZPFYyblhB2PLKuUSxztfzvYIDWrWdT:ryK12D7DxpfzgHrW
Malware Config
Extracted
xloader
2.3
6mam
gxduoke.com
lawmetricssolicitors.com
e-bizbox.com
ilovemehoodie.com
marcuslafond.com
bransolute.com
kuppers.info
kykyryky.art
vavasoo.com
tlamj.com
besport24.com
hibachiexpressnctogo.com
elglink99.com
maximos.world
uniamaa.com
aladinfarma.com
opticatervisof.com
delhibudokankarate.com
juliekifyukstyle.com
fuzhourexian.com
qvcrx.com
trendyheld.com
hanasugisaki.com
mylifeinpark.com
importexportasia.com
paypalticket5396173.info
threatprotection.net
mayartpaints.com
miamiqueensdress.com
designtomade.com
apacshift.support
candlewooddmc.com
riveraitc.com
adenxsdesign.com
fanbase.fan
beastninjas.com
shkanghong.com
f9fui8.xyz
bgpetty.com
ryderevanrobisonstudio.com
dragonshipping.com
schoolfrontoffice.com
mypursuitpodcast.com
moneyfollowsaction.com
blueline-productions.co.uk
munnarorganics.com
bagyat.com
scientiaxliv.com
genesysshop.com
freehypnosisevent.com
amazebrowser.com
coicplat.com
annettebrownlee.com
hangrylocal.com
titanusedcarsworth.com
geekotronic.com
microwgreens.com
cannamalism.com
at-academy.com
envirotechpropertiesltd.com
ramseybusinessinstitute.info
sublos.com
kilbyrnefarm.com
expressnailsspa.com
mobiessence.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4912-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3592 set thread context of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 4912 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 4912 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3592 wrote to memory of 2444 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 91 PID 3592 wrote to memory of 2444 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 91 PID 3592 wrote to memory of 2444 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 91 PID 3592 wrote to memory of 2300 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 92 PID 3592 wrote to memory of 2300 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 92 PID 3592 wrote to memory of 2300 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 92 PID 3592 wrote to memory of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93 PID 3592 wrote to memory of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93 PID 3592 wrote to memory of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93 PID 3592 wrote to memory of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93 PID 3592 wrote to memory of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93 PID 3592 wrote to memory of 4912 3592 3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3592 -
C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"2⤵PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"2⤵PID:2300
-
-
C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"C:\Users\Admin\AppData\Local\Temp\3a30a00f6eab6a14476db7139c5512302b5fff48a3111ccb6ae8e0964213f8ff.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4912
-