Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:38
Static task
static1
Behavioral task
behavioral1
Sample
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
wyzjr.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
wyzjr.exe
Resource
win10v2004-20241007-en
General
-
Target
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe
-
Size
243KB
-
MD5
4bf4450020724b27517cddead279c4ed
-
SHA1
4ced998f7bc61731e9278a40465ca56da64fbcc5
-
SHA256
8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06
-
SHA512
3a816c892d8a3d43a573e377081bec8e12ef7e2a3ba0a63302be6da15d583cbfeb649723b44eeb944d9245850c465cd1cec884b91d44573c9743cd9cd4186796
-
SSDEEP
3072:rS17XJiDxmJJ9VTgr23+Jhif76pfXRu4iDKEKD3b+lNx52hLHAnwCFcj7USifb4u:rGiPqdOd04l4lZ2lHxj7ZtJmIyO0Mmie
Malware Config
Extracted
xloader
2.5
nv0a
creativehomesrealty.com
hairshopamity.com
karunahotyoga.com
indialowfare.com
abdulnazar.com
art-handmade.com
videofx.store
onboard-alt-digital-avg.rest
lipe-engineering.com
arthurchatfield.com
keencloset.com
jsyonghui.com
hangwei.tech
price-hype.com
rlandislnteriors.com
junewilderwrites.com
dazhongwenzhai.com
tsnefise17.xyz
2ndmobi.com
natemerritt.com
votewhitesellforjudge.com
retrodoo.com
whimpervmkqsi.online
witlyfta.com
travelsci.com
fruitsmarkting.com
victoriouschamp.com
slotsobserver.press
strateficrupee.com
secondave.online
abcrefreshments.com
agonizepor.xyz
carsboard.pro
workanaonline.com
narutture.quest
musiquespoetry.com
inmobeale.com
windmillbusiness.com
banquanku.ink
hemutech.info
xn--poyrazgda-1pb.com
officiall.space
aabfreightbrokers.com
flitsbezorgers.com
sailmoraira.online
spgbr9be8xzz.biz
junglefeverpresents.com
morecreate.com
chrisngosingle.com
nailsestetic.space
suzhaobiao.com
globaltraveltouragency.com
4nvig.info
buffstaff.com
absellgroup.com
ahlsen.store
motosestrada.com
ymg77.com
totallightningactivity.net
fansveres.pro
kapdome.com
lurpak.promo
may999.com
pulselava.com
smartag2.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2388-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2388-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2188-25-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2420 wyzjr.exe 2388 wyzjr.exe -
Loads dropped DLL 3 IoCs
pid Process 1900 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 1900 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 2420 wyzjr.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2420 set thread context of 2388 2420 wyzjr.exe 31 PID 2388 set thread context of 1176 2388 wyzjr.exe 21 PID 2188 set thread context of 1176 2188 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wyzjr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2388 wyzjr.exe 2388 wyzjr.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe 2188 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2388 wyzjr.exe 2388 wyzjr.exe 2388 wyzjr.exe 2188 cmstp.exe 2188 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2388 wyzjr.exe Token: SeDebugPrivilege 2188 cmstp.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1900 wrote to memory of 2420 1900 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 30 PID 1900 wrote to memory of 2420 1900 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 30 PID 1900 wrote to memory of 2420 1900 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 30 PID 1900 wrote to memory of 2420 1900 8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe 30 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 2420 wrote to memory of 2388 2420 wyzjr.exe 31 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 1176 wrote to memory of 2188 1176 Explorer.EXE 32 PID 2188 wrote to memory of 2840 2188 cmstp.exe 34 PID 2188 wrote to memory of 2840 2188 cmstp.exe 34 PID 2188 wrote to memory of 2840 2188 cmstp.exe 34 PID 2188 wrote to memory of 2840 2188 cmstp.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe"C:\Users\Admin\AppData\Local\Temp\8cd0e616d6bdbf46e397e681954f326dab266d99f7197b5d4800460d44c3fe06.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\wyzjr.exeC:\Users\Admin\AppData\Local\Temp\wyzjr.exe C:\Users\Admin\AppData\Local\Temp\izjwkhiz3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\wyzjr.exeC:\Users\Admin\AppData\Local\Temp\wyzjr.exe C:\Users\Admin\AppData\Local\Temp\izjwkhiz4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2388
-
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\wyzjr.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5c41cc022a5b5e72d4e182de9d458a763
SHA15f92d10f77512c6b5efb80f005306bbe533c9612
SHA256bc0b3df83d1ae598d17ca9adf8a70ee3de8f9f0bc1ecf87786994277d441447f
SHA512ff66adfac66965ed5a9b7dbe999b20a9bc7d3e190d59fbbb988578557467de72bc3a834b2be42652f9fdb643709b8e9e6bf9b0d8f651be22e9408684f6703f3a
-
Filesize
212KB
MD52c86fd5b82613a4bb25162eece241874
SHA199440aad85aede39e9b2ade66b82fbd02575ab5b
SHA256eefd122c8453d86bf99cd79cce877644596446126c2d27b1bb18b8f33e762e74
SHA5124915eaf6cf72c4ceb9e799a82094290fbbe15ec04ee07c6c1aeb9af62db16c595ce432626c18a93c56557a1f75929d1b607e1c64b36e118931d5a3ce0bb9a9e2
-
Filesize
4KB
MD51a5ec202f8169810c65c8a217e04652c
SHA18f3515de3ffbd19e5410632243cdd2c7111346df
SHA256d8e511d26414c679bb7386e511a2847f627a431d33cd91f6f7860fc7d6cda704
SHA51298a1172857e64e967c396492baad7bd65b7175c7631e854b756c2a7fe046406a700d91f0b6075e95c74ddaa76631bc2436797b16dd1f637a0279b13ef1187061