Analysis
-
max time kernel
50s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe
Resource
win7-20241010-en
General
-
Target
3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe
-
Size
516KB
-
MD5
661809856945e7e1f90978e165e08fed
-
SHA1
58bafd5fee279f6e7f2c72971b53bd16f8333693
-
SHA256
3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe
-
SHA512
0fa6ebf4f1ac67b266ffc5fce812f825c21302d15c1fa886a9a7cc6d225e0dec41482f427c05b59ca3a880ececfd999fe8853f9ad5645e4b1c6c424ffc218549
-
SSDEEP
12288:zMJSBpWgQ494NOg0P12c5odVAVibMFFOpuP4rjMp4dLN314qXZ:zDBUgn94NOQ8odVKibJp0LohFPZ
Malware Config
Extracted
xloader
2.5
riho
surfcitydawg.com
pwuq9t.com
prefectfxtrader.com
369xy.com
bjhygj888.com
cabinetfuid.com
houstondynamics.net
bertiebots.com
taboohospitality.com
fearlessthread.com
loropiana-store.online
growthventuresinc.net
artairazur.xyz
tvframesdisply.com
flammifer.biz
gtnetpro.com
b3sportaintment.com
housing-staff.net
superdelicioso.com
14mpt.xyz
lonelycreatives.club
megafxcoin.com
durimar.pictures
gela-maal.com
enrgyinc.com
financylity.com
dianwwokeji.com
betaspdrm.com
edgelit.art
porta-vella.com
pollyseguros.com
amyrafood.net
turkscaicosonline.com
gzfs158.com
remixedteez.com
d72gmj3bpdhc.biz
zgledlamp.com
penroseholding.com
sustainabilitycs.com
cashlito.com
leonoratodesco.com
spirtlenders.com
hxims.com
livelinkedinevent.xyz
kook8877.online
742831.com
brightlifeprowellness.com
renzocarraro.com
aliceinhollywood.land
autoales.com
theaubainegroup.info
shoppingindia.tech
freejobs77.com
xhwipbr.com
inclu.care
richardsellscny.com
eltanque56.com
chanhouses.com
hamiltonbrewers.com
joinile.com
robot10000.com
tes5ci.com
first-timer-gear.com
shaffysfood.com
teamsterslocal553.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2924-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1276 set thread context of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2924 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29 PID 1276 wrote to memory of 2924 1276 3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe"C:\Users\Admin\AppData\Local\Temp\3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe"C:\Users\Admin\AppData\Local\Temp\3bed8547e488c397699d515cd97c222b482c302f4ba17a70980db6f0788dc2fe.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2924
-