Analysis
-
max time kernel
92s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe
Resource
win7-20241010-en
General
-
Target
433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe
-
Size
1.1MB
-
MD5
9f370c2fc3e45cf57abc978111e17955
-
SHA1
5f5d4287f9be36e79b28869c4306b6ba0a32a49e
-
SHA256
433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2
-
SHA512
555f3f1fc874e904dce1861db826c567640899e4fd65fc380e2df0502ba39e2710fc208d89fc06c9ef7cb3d97a116045714f1ef6c538b3105faa8e15d0f6d213
-
SSDEEP
24576:19tbAka1AdQY/Pmazg0n5f9l6PIYpbjb6:1XbAka1AdrO8D5FcxbH
Malware Config
Extracted
xloader
2.3
iuem
agileatefoundation.com
preheimphotography.com
blueivymart.com
magetu.info
sunayah.com
gulumsecafe.com
belveder.net
pumpkinmangaming.com
playd6plus.com
thuanland.com
blacklivesmatterforreal.com
enviromentalco.com
ferronnstyle.com
mrbeagleshop.com
whmlqx.com
unifiedfederal.com
purest-you.com
ashleymartinonline.com
bayareaportraitphotographer.com
ysnrjelx.icu
cosyarchitectural.com
alientoatelier.com
getinrolled.com
oncallteaching.com
zubaiqlinasports.com
weibees.com
deborah-williams-sculpture.com
chucksice.com
sentralele.online
neediclick.com
pcsnake.com
bigcountrytees.com
janiekillips.com
leffetvrac.com
hbxamc.com
onlineconverseshop.com
artepalabra.com
xn--sanatpazar-6ub.com
hotelplumbinginstallers.com
somethingnewstudio.com
capgunband.com
boxingbootcampcart.com
yilmazone.com
healthadvocatesinhomecare.com
sooqhoot.com
cd-gxdz.com
nrbfx.com
live-abundant-life.com
paytofindmebro.com
biolingziindonesia.site
proturflawn.net
swidow.today
doublecombat.com
skpgzone22.com
securegotapco.com
gadgetlibrarybd.com
ferropartners.com
cnsaio.com
fruitloopsmarketing.com
aadyashop.online
rdsportsbrand.com
scxinzhen.com
paloaltogarage.com
thatshowdiy.net
coffeyklatch.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2368-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 428 set thread context of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 2368 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 2368 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 428 wrote to memory of 3472 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 102 PID 428 wrote to memory of 3472 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 102 PID 428 wrote to memory of 3472 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 102 PID 428 wrote to memory of 3444 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 103 PID 428 wrote to memory of 3444 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 103 PID 428 wrote to memory of 3444 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 103 PID 428 wrote to memory of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104 PID 428 wrote to memory of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104 PID 428 wrote to memory of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104 PID 428 wrote to memory of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104 PID 428 wrote to memory of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104 PID 428 wrote to memory of 2368 428 433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe 104
Processes
-
C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"2⤵PID:3472
-
-
C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"2⤵PID:3444
-
-
C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"C:\Users\Admin\AppData\Local\Temp\433c9b077a6f8983fadf6831ff9a02d3105b5b32c325705f3d9c7687a0e968a2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2368
-