Analysis
-
max time kernel
74s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 17:31
Static task
static1
Behavioral task
behavioral1
Sample
897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe
Resource
win7-20241010-en
General
-
Target
897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe
-
Size
737KB
-
MD5
7b3930f320bc8e3a4518b0900ff713fd
-
SHA1
49f2502e24107b9e9a55537d44fd245008a1d743
-
SHA256
897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580
-
SHA512
ddea25208a5086f81d4378ddeb1cc5d6713a83607099d0b809a403770e558a9096913faa9014899da1cd2644d031c692fa2b235999e6eb20ba67859178999b26
-
SSDEEP
12288:L5g5YHfdVPIcz8CSZJVyiVp/UlFrMNf9vqDgjieZUks+EKVFtc6:b1l7zIZGiVpcT8f9vq8jiaUkiK
Malware Config
Extracted
xloader
2.5
bh9c
javhdxx.net
merakii.art
vagonorientexpress.com
charliethetortoise.com
hgspw.net
creciendoconvos.com
duppercaptat.quest
threattotal.info
heidecide.xyz
beverageplug.com
clothandcauldron.net
elbach.store
dtassistant.com
miumellow.com
militarydefensecampbase.com
backratz.com
fuzzyfrendz.com
usa-visa-open.space
moon9.xyz
staynolive.com
aea.digital
palaesthetic.com
c-h-l.biz
insurancecoveragelitigation.net
mayormuhammadmemorial.com
furtherformyk.xyz
vanguardstats.com
115guys.com
bootsausstatter-meissner.com
absolute-beaut.com
greenlink-engineering.com
hodhivedisiac.com
techforphilly.com
aloeveraslim.store
catskillstnpasumo1.xyz
normandia.pro
hkketo.club
geemove.com
amedhomehealth.net
elmsleyrose.com
yizhihotel.com
rollinsssranches.com
shelovescredit.com
tdtally.com
neighborevolvevulnerable.xyz
order-mwsonlinestore.com
kingdomcell.com
memorizemanga.online
mushrelief.com
dempius.com
homeveta.com
daknotary.com
09gjm.xyz
toonzmedianetworks.com
expressiveartsoregon.com
zzjn11.xyz
skillspedia.net
prodogmomut.com
humeer.com
mightystarhopper.com
40acgidd.com
everybunnyeverybirdy.com
whetherweatherlake.top
ibaraki-zeirishi.com
tenloe069.xyz
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2496-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2116 set thread context of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2496 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30 PID 2116 wrote to memory of 2496 2116 897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe"C:\Users\Admin\AppData\Local\Temp\897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\897201ea7e47403cf8b8431ab9a59bcee9eb559ecba43a2224852cbd5b75e580.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2496
-