Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
kczbgk.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
kczbgk.exe
Resource
win10v2004-20241007-en
General
-
Target
3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe
-
Size
337KB
-
MD5
1e9e125ed34109f2c640b25538185cac
-
SHA1
89faa5b5789eb1633ca74ee15d34c16c0b0cf174
-
SHA256
3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55
-
SHA512
b5a98b361d7006b12570b15ef28d5fdc41f274db6e95e9eea7ec6f08736676b630ad2bb0347aecb7bca9433a5f31eafa6f3bd72dd504ec4ec61dc01e06d0c1ee
-
SSDEEP
6144:rGiPGY4OddUWhpyRJ5Q/cd78kxpAX1F1NIyEA29o7EJYUlhZIzPW:yY4Opyb5Q/cV8kxGX1FMaFEJVpcW
Malware Config
Extracted
xloader
2.5
nqs9
lgingood.com
shopgeti.com
christianuomo.com
sportsxuk.com
markidesignstore.com
tjhuoliao.com
docomobb.xyz
ilrespirodelmare.com
kfconline.rest
paramusrepair.com
w3zand.com
unguamtruppe.quest
bethesdagardensloveland.net
bostonstretchlimousine.com
yycsmj.net
creatorgela.com
bestalcoholfreebeer.com
jorgeforfr.com
dlzxd.com
rajaranicoupon.xyz
marnannyc.com
bettersalud.info
xn----etbdbfqj8aat.xn--p1acf
brandsagency.net
tradequy.net
farmaciacentral.online
portaal140.top
solacebooks.online
theroastercoaster.com
vanityandsanity.store
thediscoverytrail.com
comunidadpatriota.com
simplyall.xyz
db-propertygroup.com
mgav37.xyz
dwight.store
prosperityurgentcare.us
realbrother.net
shineshaft.website
just4beauty.store
zoosmash.com
paneiro.net
splitattherootfilm.com
waytokeiomed.com
allaroundlandscapingllc.com
pageants.xyz
amenosu.com
karamrentacar.com
dfgroup.tech
valdicolor.com
nu9gayde.xyz
bookfling.store
trimcatch.com
serbersa.com
richmondcambiemedicalclinic.com
claritydesignz.com
finlandfive.xyz
hgs777.com
mjfashionnz.com
pragunananda.com
donbicicleta.com
executeonpurpose.com
proteamstaxconsultancy.com
zmduk.com
thietketrantam.art
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2944-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2944-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2944-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2840-28-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 2820 kczbgk.exe 2944 kczbgk.exe -
Loads dropped DLL 2 IoCs
pid Process 2880 3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe 2820 kczbgk.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2820 set thread context of 2944 2820 kczbgk.exe 31 PID 2944 set thread context of 1188 2944 kczbgk.exe 21 PID 2944 set thread context of 1188 2944 kczbgk.exe 21 PID 2840 set thread context of 1188 2840 wininit.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language kczbgk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2944 kczbgk.exe 2944 kczbgk.exe 2944 kczbgk.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe 2840 wininit.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2944 kczbgk.exe 2944 kczbgk.exe 2944 kczbgk.exe 2944 kczbgk.exe 2840 wininit.exe 2840 wininit.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2944 kczbgk.exe Token: SeDebugPrivilege 2840 wininit.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2820 2880 3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe 30 PID 2880 wrote to memory of 2820 2880 3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe 30 PID 2880 wrote to memory of 2820 2880 3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe 30 PID 2880 wrote to memory of 2820 2880 3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe 30 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 2820 wrote to memory of 2944 2820 kczbgk.exe 31 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2840 1188 Explorer.EXE 32 PID 2840 wrote to memory of 2676 2840 wininit.exe 33 PID 2840 wrote to memory of 2676 2840 wininit.exe 33 PID 2840 wrote to memory of 2676 2840 wininit.exe 33 PID 2840 wrote to memory of 2676 2840 wininit.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe"C:\Users\Admin\AppData\Local\Temp\3824f68042b243ff952a0184baaca8ede5c254821a8ec8e8be9fa86224ddbc55.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\kczbgk.exeC:\Users\Admin\AppData\Local\Temp\kczbgk.exe C:\Users\Admin\AppData\Local\Temp\izlci3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\kczbgk.exeC:\Users\Admin\AppData\Local\Temp\kczbgk.exe C:\Users\Admin\AppData\Local\Temp\izlci4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\kczbgk.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2676
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
211KB
MD50f791ef8faf6091b8669f3e5b2adbcd8
SHA1e2bfa7ea56a168a47cc109eade62a8218b0b2270
SHA2567f706d371f83e83437ae340a4242ee3af096f2ba5f22baa0a51be2dedb8a0eac
SHA512ace9176527a9b0a93fe217395abbb695004271eb65581cb5175a6e662d7d0412dcafff0f68a5e127ba88f78cdf04f768b35ce73aa5d90fe032b1012eb82dd7d3
-
Filesize
4KB
MD561c47d1e8fc4a14c3433e98be9607abc
SHA12d1a5e8ffb4845488ecf41926ef79c1a7fdfc025
SHA256ab8e7743f47f6443df4a96f275ae101167e8a5bbf13b268db7181d43fd7fb5b3
SHA5125a1c176f172800a49c8d16597b3516153707310b34c6220d79c1f06923ac0d2c2f3efc5586570d9001d86db1f31c281746a98a0200db4861439d680cc6890925
-
Filesize
177KB
MD50bf3e785b6a7a0c1ae07417cbf290121
SHA15cf19f555dc7ed6eefa74285e95ca7b396855793
SHA256bd0b5a7be527aa878536fa7f40dcff283a51a7138109efaf2a44440b235a0ab5
SHA512d83ab29b90b2f07d8125d5452a113ab43dffd88a423003e0a53d5937549ef7d04b4e994a8b2520637651d46080c98c8a3bea2916c1dccb42f6f97cf966ce81cb