Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-12-2024 13:27
Static task
static1
Behavioral task
behavioral1
Sample
00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe
Resource
win7-20240903-en
General
-
Target
00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe
-
Size
857KB
-
MD5
db0596af906c0293eeb802af1bc3ba4c
-
SHA1
60540d0eedf061c4b22a3144f36cc8a23dfaab9c
-
SHA256
00094c5f5f67e1a091ddbdf88ea507bae9ee4bdb06a0306e27ba4b9285c6e13b
-
SHA512
032eadb161523bd15650823bc9b50e51c3d73d8c247c489199cfa800511cecf5568bdb7b5531acf430973a8b5cd0cd109087c85446311486c0b23575fdc7f4ed
-
SSDEEP
12288:Pay+JMdzTJnZU55m7hDZ/JY1JKuqMs5JPxpn8RzgiH59UhSY:iTJs/vUulYyuNs5Jxpn8RHZ
Malware Config
Extracted
xloader
2.5
ahge
zlh.biz
suddennnnnnnnnnnn11.xyz
okanliving.com
shopeuphoricapparel.com
hcifo.com
haciendalosangeleslaguna.com
shineshaft.online
monclerjacketsusa.biz
uwuplay.com
psychicdeb.com
adonlet.com
theprogressivehomesteaders.com
ammaninstitute.com
sqpod.com
tropicbaywatergardens.net
yna901.net
3christinez.online
tastemon.com
karansabberwal.com
delegif.xyz
oceanfired.com
naturalnp.com
lichnii-kabinet.online
typetentfilm.xyz
lkw-boss.com
iwanttobesued.com
hfmfzj.com
tatorbox.com
milderrizene.quest
txperformingarts.com
xxgwe.com
marjaye.biz
noonis.online
rossmcdonnell.photography
nachhaltigkeit-club.com
ybigou.com
starbeckpart.com
atservices-co.net
rw93.xyz
pandacoffeebrand.com
nekosdailylife.com
luxuryhotelnearme.com
louiselamontagne.com
sirikwanknife.com
cigarocks.com
piteucozinhafetiva.com
whoreal.net
354aresbet.com
beauty-rec.com
eimakoia.xyz
pekavar.com
happyteedesigns.com
dropdamla.com
171diproad.com
findcasinoslots.com
theboys.one
afrcansextrip.com
piecebin.com
istanbulpetplastik.com
ferfresh.com
rotaryclubvaranasi.com
simplepathfinanacial.com
casatequisslp.com
zloto.store
amisaar.com
Signatures
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe -
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2364-8-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/2364-11-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/2364-18-0x0000000000400000-0x000000000042A000-memory.dmp xloader behavioral2/memory/2264-24-0x0000000000E90000-0x0000000000EB9000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1048 set thread context of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 2364 set thread context of 3488 2364 mstsc.exe 56 PID 2364 set thread context of 3488 2364 mstsc.exe 56 PID 2264 set thread context of 3488 2264 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 2364 mstsc.exe 2364 mstsc.exe 2364 mstsc.exe 2364 mstsc.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 2364 mstsc.exe 2364 mstsc.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe 2264 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2364 mstsc.exe 2364 mstsc.exe 2364 mstsc.exe 2364 mstsc.exe 2264 chkdsk.exe 2264 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe Token: SeDebugPrivilege 2364 mstsc.exe Token: SeDebugPrivilege 2264 chkdsk.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 1048 wrote to memory of 2364 1048 00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe 83 PID 3488 wrote to memory of 2264 3488 Explorer.EXE 86 PID 3488 wrote to memory of 2264 3488 Explorer.EXE 86 PID 3488 wrote to memory of 2264 3488 Explorer.EXE 86 PID 2264 wrote to memory of 3144 2264 chkdsk.exe 90 PID 2264 wrote to memory of 3144 2264 chkdsk.exe 90 PID 2264 wrote to memory of 3144 2264 chkdsk.exe 90
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe"C:\Users\Admin\AppData\Local\Temp\00094C5F5F67E1A091DDBDF88EA507BAE9EE4BDB06A0306E27BA4B9285C6E13B.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1048 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2844
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3552
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\mstsc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3144
-
-