Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
Machineliste.exe
Resource
win7-20240903-en
General
-
Target
Machineliste.exe
-
Size
1.3MB
-
MD5
5d81c58e9801b350c446bdd2575515f2
-
SHA1
e29e28781226c5d84b760fdc2cc57eaed8c5d6e3
-
SHA256
8bb6c5fd879114abac0f9f5812355de6974d0e02305b6dbfb57e72f90e0803a0
-
SHA512
1f0bd5464849217bae5c86c067f9e0cd7bb465752cf435fa4c00717be1c6251429c4eeee4706c9218b74af0c3c62350e352a03c4de93c85e7aca99013aebb78a
-
SSDEEP
12288:JMI4B31DdmhX2akBSgXxpmFT531tHaJiKx2iNPG9TXBxlm+LtKu1CMJR3zA5d0yt:2J71Y9TXBv3QuQcO5dzrulpu48YKE1q
Malware Config
Extracted
xloader
2.5
cg8q
postmaniac.com
pordges.com
fritzsislandcampground.com
cekenlerticaret.com
karian.one
pubgcrafter.com
yeyasdeliciasmexicanas.com
replicraft.net
medlylab.com
matkubaj.com
albertsuckow.com
zhizhengsf.com
syntaxpath.com
bridgeparktennis.online
mindpregnancy.com
retirewithmj.biz
weenatter.com
salontafel.online
duinsnowk.quest
raapmanagement.com
peepboard.com
polesoft.net
kriworld.online
emfwtpre.com
ohsodolc.com
jzqypt.com
ziomotors.com
shopchuglife.com
jojojamboree.com
xuongmaycuongbich.com
pennyhart19.info
siweitao.com
38dgj.xyz
vinod-patel.xyz
dolphinsourcing.com
reneehutchens.com
51huazhuangpin.com
cleanoutexpertsservices.com
adsfurnitures.com
bitcoinslt.com
insp3.xyz
apknorth.com
enterprisedaas.solutions
stquzsb.info
fanzerkalo.online
scanitqr-qa.com
yasseralwahidiforimport.com
handmanagementblog.com
shouwei.store
heatedvideos.com
quickiebud.com
mandygist.com
stevenalexandergolf.com
mindthatasset.com
dentistnearyou.space
eliaukk.xyz
300techsolutions.com
fresitatop.website
tbwmarket.com
reklamilanlar021.xyz
rightsfs.com
gopromaster.info
richclubsite2001.xyz
dljlogistic.biz
rohitmobile.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2972-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2432 set thread context of 2972 2432 Machineliste.exe 32 -
Program crash 1 IoCs
pid pid_target Process procid_target 2748 2972 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Machineliste.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Machineliste.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2432 Machineliste.exe 2432 Machineliste.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2432 Machineliste.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2892 2432 Machineliste.exe 31 PID 2432 wrote to memory of 2892 2432 Machineliste.exe 31 PID 2432 wrote to memory of 2892 2432 Machineliste.exe 31 PID 2432 wrote to memory of 2892 2432 Machineliste.exe 31 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2432 wrote to memory of 2972 2432 Machineliste.exe 32 PID 2972 wrote to memory of 2748 2972 Machineliste.exe 33 PID 2972 wrote to memory of 2748 2972 Machineliste.exe 33 PID 2972 wrote to memory of 2748 2972 Machineliste.exe 33 PID 2972 wrote to memory of 2748 2972 Machineliste.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"2⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 363⤵
- Program crash
PID:2748
-
-