Analysis
-
max time kernel
106s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 10:59
Static task
static1
Behavioral task
behavioral1
Sample
0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe
Resource
win7-20240903-en
General
-
Target
0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe
-
Size
1.5MB
-
MD5
b7a26e637aa3bd7fba1c3e95531f6cdc
-
SHA1
dfe13564e422386ec2fcef7ad4ecf3903b581fb7
-
SHA256
0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984
-
SHA512
99dbd6b31d94d6dc6df31e3f3f7ceb8b344b662a1add4db03c99a68ecb89a55fb0178e9270e1ece88675a87113369e792cea46e6fc722d4b17c67c9b4a062ddf
-
SSDEEP
49152:z8W5UWOfuGqMhPwo9F7A/BB8LRBFrXWqKzKzgNR5u:zD57OfuGqMhPwofA/BB8LRBF7fOR
Malware Config
Extracted
xloader
2.3
q44r
mauricenorthmore.com
9nahvj2e-666.com
vkfrr.com
lowendtherapy.com
breizh-charente-maritime.com
academydocprep.com
scampifoods.com
afamnite.com
southeasternsteakcompany.com
rokos-capital.net
gofargo-together.com
zbytlt.com
rline-official.com
ibusier.net
protectedmaintenance.com
proxrem.com
microsemiportal.com
fpvvoleibolmenores.com
creativegrowthllc.com
godslineaccelerated.com
vjyashwin-orizzonte.com
ff15beef.com
anatomykid.com
triplecheeseburgers.com
alsafeer-clen.com
eastsidefascia.com
cbexpresstrucking.com
gitaruga.com
insolvenzverfahren.net
13and15whipplerd.com
thuisverplegingharelbeke.com
emilyclouten.com
makeke.online
headsetbutton.com
sissheat.com
5531.xyz
myfibreunifi.com
vanitysteamer.com
xinnuotz.com
sellars.codes
projamz.com
kuppers.info
bossdispatchtowitnesstoday.info
theladieswholegal.com
arsenyfedorov.com
copiersearch.info
republicanswithbiden.com
thetowngaming.com
bluewolverineproductions.com
vaporecool.com
rocketcompaniesscamartists.net
artistomediaentertainment.com
y6sb.com
uoqgii.com
rme.xyz
jamzing.com
laoluodaichong.com
seguifinancial.com
frenchdortchproductions.com
that-poor-girl.com
rockingstone.net
sweettoothcreations.net
activenervous.com
bohebrand.com
designart-sh.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/4380-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2344 set thread context of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 4380 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 4380 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2344 wrote to memory of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91 PID 2344 wrote to memory of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91 PID 2344 wrote to memory of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91 PID 2344 wrote to memory of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91 PID 2344 wrote to memory of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91 PID 2344 wrote to memory of 4380 2344 0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe"C:\Users\Admin\AppData\Local\Temp\0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe"C:\Users\Admin\AppData\Local\Temp\0dd0a3dfcbf4b14b487264645dae24d1b9fa04d2c906ca1767c93b49ad2cb984.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:4380
-