Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
PO1922.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO1922.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/hahe.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/hahe.dll
Resource
win10v2004-20241007-en
General
-
Target
PO1922.exe
-
Size
436KB
-
MD5
4206075224453d62fdff5aa5c32e392b
-
SHA1
5d862e2e94f2d83d1594d21fd4f73d96a192a2f0
-
SHA256
c804865a31c4ece9c6dbf12a13593c3402f04618477746eff72709c5dc5d3ebf
-
SHA512
7c048a79159f82fe3295a92f471dd8c8f01f8ea099bf1c8f53d0335f150579fb102baeb0df9c4c96a15af57f40cc11406a47d14de3975e3a1be605c572889062
-
SSDEEP
6144:fwtwbmreTCxk0rd6Nz5iKk2CGE+qMew4cfhF+jhEKdwL4ZfRzvULe:gYmi2dvN2CGE+AMFkh56L4ZSe
Malware Config
Extracted
xloader
2.5
ssac
beautybybrin.com
oregemo.com
prospectoriq.com
blazermid.com
cloudnineloans.com
myyntisofta.com
filoupoils.com
web-solutiontnpasumo3.xyz
becbares.com
lines-hikkoshi.com
ohayouwww.com
writingdadsobituarywithdad.com
bridalbaes.com
jamshir.com
rangertots.com
dankbrobeans.com
titan111.com
uplearns.info
maxicashprokil.xyz
evc24.com
mingshan888.com
thehomefurnishings.com
jjyive.space
vtkk.info
state-attorney.online
zoho.systems
nd300.com
ivermectinforanimals.ca
gruppobenedetto.com
planet99angka.xyz
astrotiq.com
fangshensj.com
ocean.limited
zalaridumpf.quest
cursolibreonline.com
lifein.art
identspactures.com
nfltvgo.com
chronicfit.store
mariajosereina.com
hebbz764776341.com
anpxlmmspix.mobi
mydevhub.tech
nobelrealm.com
dentalteamny.com
patinerd.com
socratisbey.xyz
hnylcwfs.com
yujieqin.com
midorato.com
sunglowdragon.com
americaplr.com
cxqdscape.com
situsgacor.xyz
sattlerei-dortmund.com
life120lospaccio.com
riddleme.one
perpustakaan-geominerba.online
renatafaceandbodyskincare.com
allkoreas.com
myvisitiq.com
candlesallday.com
poleador.com
4hsp116.com
homesbyvw.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2920-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2920-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2484-19-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2452 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2168 PO1922.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2168 set thread context of 2920 2168 PO1922.exe 30 PID 2920 set thread context of 1192 2920 PO1922.exe 21 PID 2484 set thread context of 1192 2484 systray.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO1922.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2920 PO1922.exe 2920 PO1922.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe 2484 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2920 PO1922.exe 2920 PO1922.exe 2920 PO1922.exe 2484 systray.exe 2484 systray.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2920 PO1922.exe Token: SeDebugPrivilege 2484 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 2168 wrote to memory of 2920 2168 PO1922.exe 30 PID 1192 wrote to memory of 2484 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2484 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2484 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2484 1192 Explorer.EXE 31 PID 2484 wrote to memory of 2452 2484 systray.exe 32 PID 2484 wrote to memory of 2452 2484 systray.exe 32 PID 2484 wrote to memory of 2452 2484 systray.exe 32 PID 2484 wrote to memory of 2452 2484 systray.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\PO1922.exe"C:\Users\Admin\AppData\Local\Temp\PO1922.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\PO1922.exe"C:\Users\Admin\AppData\Local\Temp\PO1922.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2920
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO1922.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2452
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
19KB
MD5c2011862c7102ab56ad2b1d8bd68d39b
SHA192bd5b2ed09c6c291732a5de851863410e97dd7d
SHA256441abd6663c6823e8ac2c1facfa6bd147e28504c43dee969376ec6cfceb898d3
SHA512c9971837b6b420ae4d72f265b118cce6667116d3d00c5731856708ae8b7c93070fafd34a62bcef0890014cefd115a5ef6d92f380735fac415b1a129c256187fd