Overview
overview
10Static
static
6captured_m...lK.exe
windows7-x64
10captured_m...lK.exe
windows10-2004-x64
10captured_m...gn.apk
android-9-x86
captured_m...22.apk
windows7-x64
3captured_m...22.apk
windows10-2004-x64
3captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...cE.exe
windows7-x64
10captured_m...cE.exe
windows10-2004-x64
10captured_m...ak.exe
windows7-x64
10captured_m...ak.exe
windows10-2004-x64
10captured_m...ly.exe
windows7-x64
10captured_m...ly.exe
windows10-2004-x64
10captured_m...Ql.exe
windows7-x64
10captured_m...Ql.exe
windows10-2004-x64
10captured_m...tU.exe
windows7-x64
10captured_m...tU.exe
windows10-2004-x64
10captured_m...2z.exe
windows7-x64
3captured_m...2z.exe
windows10-2004-x64
3captured_m...MU.exe
windows7-x64
10captured_m...MU.exe
windows10-2004-x64
10captured_m...EU.exe
windows7-x64
3captured_m...EU.exe
windows10-2004-x64
3captured_m...Gs.exe
windows7-x64
3captured_m...Gs.exe
windows10-2004-x64
3captured_m...i6.exe
windows7-x64
3captured_m...i6.exe
windows10-2004-x64
3captured_m...CW.exe
windows7-x64
10captured_m...CW.exe
windows10-2004-x64
10captured_m...s6.exe
windows7-x64
10captured_m...s6.exe
windows10-2004-x64
10Analysis
-
max time kernel
150s -
max time network
181s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:41
Behavioral task
behavioral1
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
captured_malware/20210731_resign.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
captured_malware/33722.apk
Resource
win7-20240729-en
Behavioral task
behavioral5
Sample
captured_malware/33722.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral7
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral8
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win7-20241023-en
Behavioral task
behavioral12
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
captured_malware/6th july.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
captured_malware/6th july.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
captured_malware/EMU.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
captured_malware/EMU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win7-20240903-en
Behavioral task
behavioral26
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win7-20240708-en
Behavioral task
behavioral28
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win7-20240729-en
Behavioral task
behavioral30
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win7-20241010-en
Behavioral task
behavioral32
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win10v2004-20241007-en
General
-
Target
captured_malware/EMU.exe
-
Size
1.1MB
-
MD5
9d950d95e33cda5789d549ae9f27d3a1
-
SHA1
f96003fff605e13c18773741878b0a9f1a03a4c6
-
SHA256
a09ad5ee3ef9214717004d7e8c2761a0a2f010e74755f4c99ab4be8d592794cc
-
SHA512
db04584c57392bb453c99ba9f6a614b62a9727b33f2e55c05766e5004b2086f47399b938161d292b6439f079624c03ac501d44428d8209a90ce61eae7cabdbab
-
SSDEEP
24576:xYHtb9SH7UHokfWOLVDtz/Pkg0n5f9l6PIYpbjb6:xYNbIUHokfrVtz/MD5FcxbH
Malware Config
Extracted
xloader
2.3
qn6g
kemtechonline.com
myjourneywithothers.com
pfifaq.com
vaziva-immo.net
thethickpick.com
sidvip.com
bidaleri.com
allginns.com
farmersystemofanalysis.com
shoponserendipity.com
expressdeliverybd.com
hargatoyota-malang.com
taichiforcalmess.com
lovewickcandlecompany.com
chrometoasterrv.com
chustozen.site
xiaofeizhi.com
nbzweb.xyz
tequenovegano.com
e-elearningconsultancy.com
foambelievable.com
nashvilleroofpro.com
pb-einvoicing.com
corkpinebuilders.com
mindyourbehind.com
urnasaurora.com
redai.run
inverphone.com
dropshipzen.com
squatrackforsale.com
worldanimaltransport.com
trexmaster.com
ifilmovie.com
toughpasswordgenerator.com
nuocvietnet.com
felaugh.com
mcafeefreedomcoin.com
igrejacelta.com
hongdaoqiye.com
fil-martime.com
solisdq.info
mission-fair.net
dramharbours.com
roof801.com
superbahis62.com
szly9188.com
olezarsen.com
sonthuduc.com
sweatandsparkledaily.com
ivaraa.com
teknotelhosting.com
lnxdex.com
casaenvero.com
investmentcommunities.com
lifeat6k.com
realerestate.com
tins.expert
photomodell.com
myfordbenefuts.com
creative-escort.com
3lidj.net
elenaircenter.com
hbtaste.com
8978299.com
simplebox.world
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral22/memory/3668-35-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral22/memory/3668-114-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral22/memory/4852-116-0x00000000005A0000-0x00000000005C8000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1080 powershell.exe 2368 powershell.exe 4896 powershell.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\International\Geo\Nation EMU.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2016 set thread context of 3668 2016 EMU.exe 105 PID 3668 set thread context of 3536 3668 EMU.exe 56 PID 3668 set thread context of 3536 3668 EMU.exe 56 PID 4852 set thread context of 3536 4852 control.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4120 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 47 IoCs
pid Process 4896 powershell.exe 1080 powershell.exe 2016 EMU.exe 2016 EMU.exe 2016 EMU.exe 3668 EMU.exe 3668 EMU.exe 3668 EMU.exe 3668 EMU.exe 2368 powershell.exe 4896 powershell.exe 1080 powershell.exe 2368 powershell.exe 3668 EMU.exe 3668 EMU.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe 4852 control.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3668 EMU.exe 3668 EMU.exe 3668 EMU.exe 3668 EMU.exe 4852 control.exe 4852 control.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4896 powershell.exe Token: SeDebugPrivilege 1080 powershell.exe Token: SeDebugPrivilege 2016 EMU.exe Token: SeDebugPrivilege 3668 EMU.exe Token: SeDebugPrivilege 2368 powershell.exe Token: SeShutdownPrivilege 3536 Explorer.EXE Token: SeCreatePagefilePrivilege 3536 Explorer.EXE Token: SeShutdownPrivilege 3536 Explorer.EXE Token: SeCreatePagefilePrivilege 3536 Explorer.EXE Token: SeShutdownPrivilege 3536 Explorer.EXE Token: SeCreatePagefilePrivilege 3536 Explorer.EXE Token: SeDebugPrivilege 4852 control.exe Token: SeShutdownPrivilege 3536 Explorer.EXE Token: SeCreatePagefilePrivilege 3536 Explorer.EXE -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2016 wrote to memory of 4896 2016 EMU.exe 96 PID 2016 wrote to memory of 4896 2016 EMU.exe 96 PID 2016 wrote to memory of 4896 2016 EMU.exe 96 PID 2016 wrote to memory of 1080 2016 EMU.exe 98 PID 2016 wrote to memory of 1080 2016 EMU.exe 98 PID 2016 wrote to memory of 1080 2016 EMU.exe 98 PID 2016 wrote to memory of 4120 2016 EMU.exe 100 PID 2016 wrote to memory of 4120 2016 EMU.exe 100 PID 2016 wrote to memory of 4120 2016 EMU.exe 100 PID 2016 wrote to memory of 2368 2016 EMU.exe 102 PID 2016 wrote to memory of 2368 2016 EMU.exe 102 PID 2016 wrote to memory of 2368 2016 EMU.exe 102 PID 2016 wrote to memory of 4684 2016 EMU.exe 103 PID 2016 wrote to memory of 4684 2016 EMU.exe 103 PID 2016 wrote to memory of 4684 2016 EMU.exe 103 PID 2016 wrote to memory of 3668 2016 EMU.exe 105 PID 2016 wrote to memory of 3668 2016 EMU.exe 105 PID 2016 wrote to memory of 3668 2016 EMU.exe 105 PID 2016 wrote to memory of 3668 2016 EMU.exe 105 PID 2016 wrote to memory of 3668 2016 EMU.exe 105 PID 2016 wrote to memory of 3668 2016 EMU.exe 105 PID 3536 wrote to memory of 4852 3536 Explorer.EXE 107 PID 3536 wrote to memory of 4852 3536 Explorer.EXE 107 PID 3536 wrote to memory of 4852 3536 Explorer.EXE 107 PID 4852 wrote to memory of 4936 4852 control.exe 108 PID 4852 wrote to memory of 4936 4852 control.exe 108 PID 4852 wrote to memory of 4936 4852 control.exe 108
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4896
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wqvgFwuomLDukB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1080
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wqvgFwuomLDukB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF9FB.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:4120
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wqvgFwuomLDukB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵PID:4684
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3668
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2188
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD59c972c14ff0216ea2d0938b947e0eccb
SHA1330ad841f4d6cac98aec0798ab30866009ce1c4e
SHA256ab7d61be3e0da519e5337edfada9cad30d14cdc47a5e44d7324e917dbb5e690a
SHA5120d00c1efd1a24d08efbd6ad4b971bacc804c17d6be1c9b947c818d4b7c6e4bf0376579c31eb9060a5a700b0bd84c6d988bf454da1e5b9860ab586dfc7c4042bb
-
Filesize
64B
MD5dd89ef73688f528d4a439da28eb525b2
SHA15e305d2eb455cd863c73852ad5458ee664d9c828
SHA25648c8f8121bfb2bd282f8420299c361fbb6d993ae5b83b418c5825209b0484afb
SHA512dc2d0529f7504281c72d88cec63f8bfa95bce108d8cc68c61f2d535304805427b17961648fb11d924d378a5672ef1a5ee56e9665bce644de84a0231fcabb512a
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD5acd76dcb07f32ad5d56f0969b50fb3d1
SHA18060f978592431ab907a6dca107151c90c66051b
SHA256ef43d1085d839e9f542c9e6b06d2b34f5657a6d2becf1c87c853bec963d1288b
SHA5122ef6b885ab1a221f8e2bcd4a2279eb43230a7d57a685998bb5c5afe62880038726f6ae0228a83212ac5b9a80690763b562e43046588df78eddc6c4c2acfbfbd2