Analysis
-
max time kernel
96s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 11:05
Static task
static1
Behavioral task
behavioral1
Sample
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe
Resource
win7-20240903-en
General
-
Target
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe
-
Size
588KB
-
MD5
80457ed80eafe07d9dd3ffb9179ea01c
-
SHA1
7637c854b29e7a33bf69b5a1d7dd09ad24bd3134
-
SHA256
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b
-
SHA512
f1f17b3e8a63ad65a45f2a0e58e4a34e2e6dab08e87c5412eddb3e45dd81aef18dcd276972e5cd04901b87d88e5c317fdaafc1fc41fcd34a5d1ad04c2c88892f
-
SSDEEP
12288:pr3bUzN/1YCKK+NZx2UO3bQPy7LFOhsReHHW:o/KKiZxhwbQPy7JOyRenW
Malware Config
Extracted
xloader
2.5
fqiq
driventow.com
ipatchwork.today
bolder.equipment
seal-brother.com
mountlaketerraceapartments.com
weeden.xyz
sanlifalan.com
athafood.com
isshinn1.com
creationslazzaroni.com
eclecticrenaissancewoman.com
satellitephonstore.com
cotchildcare.com
yamacorp.digital
ff4cuno43.xyz
quicksticks.community
govindfinance.com
farmersfirstseed.com
megacinema.club
tablescaperendezvous4two.com
ecarehomes.com
floaterslaser.com
benisano.com
saint444.com
thedusi.com
avafxtrade.online
hanenosuke.com
suntioil4u.com
healthyweekendtips.com
24000words.com
ofbchina.net
begukiu0.info
wolmoda.com
mask60.com
4bellemaison.com
mambacustomboats.com
sedsn.com
doggycc.com
kangrungao.com
pharmacistcharisma.com
passiverewardssystems.com
qywyfeo8.xyz
shenjiclass.com
rdoi.top
lavishbynovell.com
fleetton.com
hillcresthomegroup.com
hartfulcleaning.com
srofkansas.com
applebroog.industries
phillytrainers.com
dmc--llc.com
sosoon.store
daysyou.com
controldatasa.com
markarge.com
hirayaawards.com
clinicscluster.com
sophiagunterman.art
kirtansangeet.com
residential.insure
ribbonofficial.com
qianhaijcc.com
fytvankin.quest
esyscoloradosprings.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
Processes:
resource yara_rule behavioral2/memory/4712-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
Processes:
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exedescription pid process target process PID 428 set thread context of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exepid process 4712 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe 4712 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exedescription pid process target process PID 428 wrote to memory of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe PID 428 wrote to memory of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe PID 428 wrote to memory of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe PID 428 wrote to memory of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe PID 428 wrote to memory of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe PID 428 wrote to memory of 4712 428 fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe"C:\Users\Admin\AppData\Local\Temp\fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Users\Admin\AppData\Local\Temp\fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe"C:\Users\Admin\AppData\Local\Temp\fb87b4368253ea2b65518b377a9aad680f4a809cba2246bf90dab8a9dfe6bb7b.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4712
-