Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe
Resource
win7-20241010-en
General
-
Target
1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe
-
Size
813KB
-
MD5
efe545e522545ef40bfcbacca20c71fc
-
SHA1
977ff6a2a699c8d10db1797334f0aa0ec5893a33
-
SHA256
1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99
-
SHA512
3875d4fd4a9bb7737b56ebc1f6357c17f3950883e1a9904ad689227307c983afe8134d4392a7ddf34f499a5e2c60c5b9a5dfe5bcb82ade5923f8120106c0210d
-
SSDEEP
12288:HsNpRUvsmtiK5oUZN3cIjn2YIGnraJk9JQW00aqvYqhAIWIGV5fnGQK:HeUU+FomMIjn2pJkU0DlA3IGV9nZK
Malware Config
Extracted
xloader
2.3
ssee
portalcanaa.com
korzino.com
dlylms.net
smartearphoneshop.com
olimiloshop.com
auvdigitalstack.com
ydxc.chat
yhk868.com
lifeinthedport.com
self-sciencelabs.com
scandicpack.com
hold-sometimes.xyz
beiputei.com
yourrealtorcoach.com
rxods.com
fundsoption.com
ahlstromclothes.com
ksdieselparts.com
accountmangerford.com
kuwaitlogistic.com
xuanthanhpham.com
uybike.com
babyacademycy.com
zhongbuwujin.com
reclaimminnesota.net
yurunhuatian.com
eigowith.com
pharmviewfarms.com
mcmillan-phillips.com
xinkseo.com
dabaichuihl.com
modifiedmkt.com
magnificocreative.com
energytrainingireland.com
special-beauty.net
solutionexperts.xyz
upstaff.info
taravelis.online
lushthingz.com
harwestco.com
126034cp.com
lamdep-gluwhitevn.website
megenep.com
upperreceiver.com
healthywayservices.com
groupebpcenatixis.com
blackledorganizations.net
carolinasoares.com
bureaultd.com
smartcontractlegalfirm.com
perfecshipping.com
aktarbaba.com
bulukx.com
wazolerino.info
account.farm
skstchers.com
perwiranusa.com
ourtown.directory
cuidomiforma.com
thecodestage.com
0898htt.com
yamalo.club
hdzj365.xyz
canaldotenis.com
idt-metrofireandsecurity.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2832-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2844 set thread context of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 2832 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2844 wrote to memory of 2812 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 30 PID 2844 wrote to memory of 2812 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 30 PID 2844 wrote to memory of 2812 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 30 PID 2844 wrote to memory of 2812 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 30 PID 2844 wrote to memory of 2792 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 31 PID 2844 wrote to memory of 2792 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 31 PID 2844 wrote to memory of 2792 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 31 PID 2844 wrote to memory of 2792 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 31 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32 PID 2844 wrote to memory of 2832 2844 1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"2⤵PID:2792
-
-
C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"C:\Users\Admin\AppData\Local\Temp\1fad173e519f8c7cb34093e926807794765789e79d377e89ffe201ae8d76dd99.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2832
-