Overview
overview
10Static
static
6captured_m...lK.exe
windows7-x64
10captured_m...lK.exe
windows10-2004-x64
10captured_m...gn.apk
android-9-x86
captured_m...22.apk
windows7-x64
3captured_m...22.apk
windows10-2004-x64
3captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...cE.exe
windows7-x64
10captured_m...cE.exe
windows10-2004-x64
10captured_m...ak.exe
windows7-x64
10captured_m...ak.exe
windows10-2004-x64
10captured_m...ly.exe
windows7-x64
10captured_m...ly.exe
windows10-2004-x64
10captured_m...Ql.exe
windows7-x64
10captured_m...Ql.exe
windows10-2004-x64
10captured_m...tU.exe
windows7-x64
10captured_m...tU.exe
windows10-2004-x64
10captured_m...2z.exe
windows7-x64
3captured_m...2z.exe
windows10-2004-x64
3captured_m...MU.exe
windows7-x64
10captured_m...MU.exe
windows10-2004-x64
10captured_m...EU.exe
windows7-x64
3captured_m...EU.exe
windows10-2004-x64
3captured_m...Gs.exe
windows7-x64
3captured_m...Gs.exe
windows10-2004-x64
3captured_m...i6.exe
windows7-x64
3captured_m...i6.exe
windows10-2004-x64
3captured_m...CW.exe
windows7-x64
10captured_m...CW.exe
windows10-2004-x64
10captured_m...s6.exe
windows7-x64
10captured_m...s6.exe
windows10-2004-x64
10Analysis
-
max time kernel
146s -
max time network
21s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:41
Behavioral task
behavioral1
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
captured_malware/20210731_resign.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
captured_malware/33722.apk
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
captured_malware/33722.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
captured_malware/6th july.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
captured_malware/6th july.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
captured_malware/EMU.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
captured_malware/EMU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win10v2004-20241007-en
General
-
Target
captured_malware/EMU.exe
-
Size
1.1MB
-
MD5
9d950d95e33cda5789d549ae9f27d3a1
-
SHA1
f96003fff605e13c18773741878b0a9f1a03a4c6
-
SHA256
a09ad5ee3ef9214717004d7e8c2761a0a2f010e74755f4c99ab4be8d592794cc
-
SHA512
db04584c57392bb453c99ba9f6a614b62a9727b33f2e55c05766e5004b2086f47399b938161d292b6439f079624c03ac501d44428d8209a90ce61eae7cabdbab
-
SSDEEP
24576:xYHtb9SH7UHokfWOLVDtz/Pkg0n5f9l6PIYpbjb6:xYNbIUHokfrVtz/MD5FcxbH
Malware Config
Extracted
xloader
2.3
qn6g
kemtechonline.com
myjourneywithothers.com
pfifaq.com
vaziva-immo.net
thethickpick.com
sidvip.com
bidaleri.com
allginns.com
farmersystemofanalysis.com
shoponserendipity.com
expressdeliverybd.com
hargatoyota-malang.com
taichiforcalmess.com
lovewickcandlecompany.com
chrometoasterrv.com
chustozen.site
xiaofeizhi.com
nbzweb.xyz
tequenovegano.com
e-elearningconsultancy.com
foambelievable.com
nashvilleroofpro.com
pb-einvoicing.com
corkpinebuilders.com
mindyourbehind.com
urnasaurora.com
redai.run
inverphone.com
dropshipzen.com
squatrackforsale.com
worldanimaltransport.com
trexmaster.com
ifilmovie.com
toughpasswordgenerator.com
nuocvietnet.com
felaugh.com
mcafeefreedomcoin.com
igrejacelta.com
hongdaoqiye.com
fil-martime.com
solisdq.info
mission-fair.net
dramharbours.com
roof801.com
superbahis62.com
szly9188.com
olezarsen.com
sonthuduc.com
sweatandsparkledaily.com
ivaraa.com
teknotelhosting.com
lnxdex.com
casaenvero.com
investmentcommunities.com
lifeat6k.com
realerestate.com
tins.expert
photomodell.com
myfordbenefuts.com
creative-escort.com
3lidj.net
elenaircenter.com
hbtaste.com
8978299.com
simplebox.world
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral21/memory/2504-25-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral21/memory/1440-37-0x00000000000D0000-0x00000000000F8000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2648 powershell.exe 1908 powershell.exe 2080 powershell.exe -
Deletes itself 1 IoCs
pid Process 2928 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2472 set thread context of 2504 2472 EMU.exe 38 PID 2504 set thread context of 1188 2504 EMU.exe 21 PID 1440 set thread context of 1188 1440 rundll32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2504 EMU.exe 2504 EMU.exe 2648 powershell.exe 1908 powershell.exe 2080 powershell.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe 1440 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2504 EMU.exe 2504 EMU.exe 2504 EMU.exe 1440 rundll32.exe 1440 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2472 EMU.exe Token: SeDebugPrivilege 2504 EMU.exe Token: SeDebugPrivilege 1908 powershell.exe Token: SeDebugPrivilege 2648 powershell.exe Token: SeDebugPrivilege 2080 powershell.exe Token: SeDebugPrivilege 1440 rundll32.exe -
Suspicious use of WriteProcessMemory 34 IoCs
description pid Process procid_target PID 2472 wrote to memory of 2648 2472 EMU.exe 31 PID 2472 wrote to memory of 2648 2472 EMU.exe 31 PID 2472 wrote to memory of 2648 2472 EMU.exe 31 PID 2472 wrote to memory of 2648 2472 EMU.exe 31 PID 2472 wrote to memory of 1908 2472 EMU.exe 33 PID 2472 wrote to memory of 1908 2472 EMU.exe 33 PID 2472 wrote to memory of 1908 2472 EMU.exe 33 PID 2472 wrote to memory of 1908 2472 EMU.exe 33 PID 2472 wrote to memory of 2540 2472 EMU.exe 35 PID 2472 wrote to memory of 2540 2472 EMU.exe 35 PID 2472 wrote to memory of 2540 2472 EMU.exe 35 PID 2472 wrote to memory of 2540 2472 EMU.exe 35 PID 2472 wrote to memory of 2080 2472 EMU.exe 37 PID 2472 wrote to memory of 2080 2472 EMU.exe 37 PID 2472 wrote to memory of 2080 2472 EMU.exe 37 PID 2472 wrote to memory of 2080 2472 EMU.exe 37 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 2472 wrote to memory of 2504 2472 EMU.exe 38 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1188 wrote to memory of 1440 1188 Explorer.EXE 40 PID 1440 wrote to memory of 2928 1440 rundll32.exe 41 PID 1440 wrote to memory of 2928 1440 rundll32.exe 41 PID 1440 wrote to memory of 2928 1440 rundll32.exe 41 PID 1440 wrote to memory of 2928 1440 rundll32.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2648
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wqvgFwuomLDukB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1908
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wqvgFwuomLDukB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp72C0.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2540
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wqvgFwuomLDukB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2504
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1440 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2928
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5393d8bb1bbe74af739d155998b2a20c5
SHA1c68add65ae01839d2a6054606ffcf94fdeb3115e
SHA25675347e280bdd5afd62c25b6dc7322e50521bca6da86af4d47f5d7ee3aff0683a
SHA5123a72084334968b7e0eded577e9cb02bdad6a2fad8a186b9c2f92b2840d6832cce678bce58f88f9a29791f6c31f0011909dd9a5a6c9d4659db5c96ec881062d85
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\Q37SZSM9UYGKWLEF8MJ3.temp
Filesize7KB
MD5120a860763089aacb542425a420ac901
SHA12c6adf32e364ae5427b3cdd587d97ab3789298e4
SHA256c9b750862082080de1f3fe444768126af98b2ece4602b3dc626df98f64ab9b25
SHA512fd2a9dd1102a6180d2fa42385129e675bc2e283d74c72569e2a7b6134a86b513127f3c2ab1d78f9be89d846054db4109982867e554d79125c93044ad6e9a779a