Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 18:34
Static task
static1
Behavioral task
behavioral1
Sample
266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe
Resource
win7-20241010-en
General
-
Target
266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe
-
Size
417KB
-
MD5
561b2242c36b5599a5c4e25a3322534e
-
SHA1
fb5a634c77d7f6346ea7d0c3860c3f5a0781618e
-
SHA256
266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74
-
SHA512
fa961bf85f2c4f9018ba5dedbd80c1ba4d9de7fd4e79fb2cdf794deb7eb8384e9d56d5cfdf68c552975d5c3594bb22784bce3b846eb98faf4082b02bdd2ed309
-
SSDEEP
12288:Awhxe47sMXuMCIy04qtaOhv+AlicO/xI/SbVJ50D805VU:Aw3H7drCI4qtaK+Ali9e/SxJ502
Malware Config
Extracted
xloader
2.5
wogm
sub-dude.net
repeatcustom.com
goodspaz.com
sinagropuree.com
jyh8886.com
muescabynes.quest
stark.agency
nolimit168.com
hypermediastore.com
arab-xt-pro.com
gruppovimar.com
santamariamoto.express
affaridistribuciones.com
straetah.com
collectionsbyvivi.com
nalainteriores.com
weeklywars.com
insightmyhome.com
ucml.net
herderguru.com
sz-jialejia.com
xinglu56.com
tenselect.net
arepaspuesdc.com
cvkf.email
moseslakeapartment.com
chantaldesign.space
884651.com
yzyf88.com
seattlecanna.com
obsessive.company
blessedfurnitures.com
disparandose.com
smmakrygiannakis.online
buno8ce.com
javaportal.info
laoqu6666.com
portfolioinsidertips.com
workospbit.space
biocrafts.net
estebancantillo.com
appliancestar.xyz
gloriousbees.xyz
porchlightwoodworks.com
rawhoneytnpasumo2.xyz
pokipass-niigata.com
aodesai.store
powro.online
playin.one
minded-afoot.com
zpahura.com
bodybybetsy.com
camworker.cloud
mest2.com
chezlulu.paris
officeupdate365.com
jackdanska.com
glenndcp.com
huikanvip.com
connectedtoolstore.com
flogicpro.com
yourhomestimate.com
dogtraining5x5.com
truenettnpasumo2.xyz
eygtogel021.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/2076-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 2076 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 2076 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2380 wrote to memory of 3828 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 98 PID 2380 wrote to memory of 3828 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 98 PID 2380 wrote to memory of 3828 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 98 PID 2380 wrote to memory of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99 PID 2380 wrote to memory of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99 PID 2380 wrote to memory of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99 PID 2380 wrote to memory of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99 PID 2380 wrote to memory of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99 PID 2380 wrote to memory of 2076 2380 266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe"C:\Users\Admin\AppData\Local\Temp\266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Users\Admin\AppData\Local\Temp\266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe"C:\Users\Admin\AppData\Local\Temp\266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe"2⤵PID:3828
-
-
C:\Users\Admin\AppData\Local\Temp\266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe"C:\Users\Admin\AppData\Local\Temp\266a42301d52352d24b59aa618d582afac1c2f27a5ab66e6e26a42314b5f4f74.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2076
-