Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 07:42
Static task
static1
Behavioral task
behavioral1
Sample
Machineliste.exe
Resource
win7-20240903-en
General
-
Target
Machineliste.exe
-
Size
1.3MB
-
MD5
5d81c58e9801b350c446bdd2575515f2
-
SHA1
e29e28781226c5d84b760fdc2cc57eaed8c5d6e3
-
SHA256
8bb6c5fd879114abac0f9f5812355de6974d0e02305b6dbfb57e72f90e0803a0
-
SHA512
1f0bd5464849217bae5c86c067f9e0cd7bb465752cf435fa4c00717be1c6251429c4eeee4706c9218b74af0c3c62350e352a03c4de93c85e7aca99013aebb78a
-
SSDEEP
12288:JMI4B31DdmhX2akBSgXxpmFT531tHaJiKx2iNPG9TXBxlm+LtKu1CMJR3zA5d0yt:2J71Y9TXBv3QuQcO5dzrulpu48YKE1q
Malware Config
Extracted
xloader
2.5
cg8q
postmaniac.com
pordges.com
fritzsislandcampground.com
cekenlerticaret.com
karian.one
pubgcrafter.com
yeyasdeliciasmexicanas.com
replicraft.net
medlylab.com
matkubaj.com
albertsuckow.com
zhizhengsf.com
syntaxpath.com
bridgeparktennis.online
mindpregnancy.com
retirewithmj.biz
weenatter.com
salontafel.online
duinsnowk.quest
raapmanagement.com
peepboard.com
polesoft.net
kriworld.online
emfwtpre.com
ohsodolc.com
jzqypt.com
ziomotors.com
shopchuglife.com
jojojamboree.com
xuongmaycuongbich.com
pennyhart19.info
siweitao.com
38dgj.xyz
vinod-patel.xyz
dolphinsourcing.com
reneehutchens.com
51huazhuangpin.com
cleanoutexpertsservices.com
adsfurnitures.com
bitcoinslt.com
insp3.xyz
apknorth.com
enterprisedaas.solutions
stquzsb.info
fanzerkalo.online
scanitqr-qa.com
yasseralwahidiforimport.com
handmanagementblog.com
shouwei.store
heatedvideos.com
quickiebud.com
mandygist.com
stevenalexandergolf.com
mindthatasset.com
dentistnearyou.space
eliaukk.xyz
300techsolutions.com
fresitatop.website
tbwmarket.com
reklamilanlar021.xyz
rightsfs.com
gopromaster.info
richclubsite2001.xyz
dljlogistic.biz
rohitmobile.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2852-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2852-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2852-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/232-28-0x0000000000DB0000-0x0000000000DD9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1588 set thread context of 2852 1588 Machineliste.exe 100 PID 2852 set thread context of 3584 2852 Machineliste.exe 56 PID 2852 set thread context of 3584 2852 Machineliste.exe 56 PID 232 set thread context of 3584 232 colorcpl.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Machineliste.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1588 Machineliste.exe 1588 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe 232 colorcpl.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2852 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 2852 Machineliste.exe 232 colorcpl.exe 232 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1588 Machineliste.exe Token: SeDebugPrivilege 2852 Machineliste.exe Token: SeDebugPrivilege 232 colorcpl.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1588 wrote to memory of 2812 1588 Machineliste.exe 99 PID 1588 wrote to memory of 2812 1588 Machineliste.exe 99 PID 1588 wrote to memory of 2812 1588 Machineliste.exe 99 PID 1588 wrote to memory of 2852 1588 Machineliste.exe 100 PID 1588 wrote to memory of 2852 1588 Machineliste.exe 100 PID 1588 wrote to memory of 2852 1588 Machineliste.exe 100 PID 1588 wrote to memory of 2852 1588 Machineliste.exe 100 PID 1588 wrote to memory of 2852 1588 Machineliste.exe 100 PID 1588 wrote to memory of 2852 1588 Machineliste.exe 100 PID 3584 wrote to memory of 232 3584 Explorer.EXE 101 PID 3584 wrote to memory of 232 3584 Explorer.EXE 101 PID 3584 wrote to memory of 232 3584 Explorer.EXE 101 PID 232 wrote to memory of 1004 232 colorcpl.exe 102 PID 232 wrote to memory of 1004 232 colorcpl.exe 102 PID 232 wrote to memory of 1004 232 colorcpl.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"3⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Machineliste.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1004
-
-