Overview
overview
10Static
static
6captured_m...lK.exe
windows7-x64
10captured_m...lK.exe
windows10-2004-x64
10captured_m...gn.apk
android-9-x86
captured_m...22.apk
windows7-x64
3captured_m...22.apk
windows10-2004-x64
3captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...22.apk
android-9-x86
captured_m...cE.exe
windows7-x64
10captured_m...cE.exe
windows10-2004-x64
10captured_m...ak.exe
windows7-x64
10captured_m...ak.exe
windows10-2004-x64
10captured_m...ly.exe
windows7-x64
8captured_m...ly.exe
windows10-2004-x64
10captured_m...Ql.exe
windows7-x64
10captured_m...Ql.exe
windows10-2004-x64
10captured_m...tU.exe
windows7-x64
10captured_m...tU.exe
windows10-2004-x64
10captured_m...2z.exe
windows7-x64
3captured_m...2z.exe
windows10-2004-x64
3captured_m...MU.exe
windows7-x64
10captured_m...MU.exe
windows10-2004-x64
10captured_m...EU.exe
windows7-x64
3captured_m...EU.exe
windows10-2004-x64
3captured_m...Gs.exe
windows7-x64
3captured_m...Gs.exe
windows10-2004-x64
3captured_m...i6.exe
windows7-x64
3captured_m...i6.exe
windows10-2004-x64
3captured_m...CW.exe
windows7-x64
10captured_m...CW.exe
windows10-2004-x64
10captured_m...s6.exe
windows7-x64
10captured_m...s6.exe
windows10-2004-x64
10Analysis
-
max time kernel
149s -
max time network
24s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 13:44
Behavioral task
behavioral1
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
captured_malware/1Ptfo0FZUMT7hlK.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
captured_malware/20210731_resign.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral4
Sample
captured_malware/33722.apk
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
captured_malware/33722.apk
Resource
win10v2004-20241007-en
Behavioral task
behavioral6
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral7
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240910-en
Behavioral task
behavioral8
Sample
captured_malware/33722.apk
Resource
android-x86-arm-20240624-en
Behavioral task
behavioral9
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
captured_malware/5KNTQd5xFuY7hcE.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
captured_malware/6Dy0Bg4B9kkMsak.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
captured_malware/6th july.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
captured_malware/6th july.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
captured_malware/77KpMaGlUit8zQl.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
captured_malware/BuXTaVVWA5WdvtU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
captured_malware/DBti7kFcOLHaK2z.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
captured_malware/EMU.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
captured_malware/EMU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
captured_malware/EgVhr9cVP2SFBEU.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral25
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
captured_malware/Hlt9VTppbZE9UGs.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral27
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win7-20241010-en
Behavioral task
behavioral28
Sample
captured_malware/KVxnEZMWrmek1i6.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral29
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win7-20240903-en
Behavioral task
behavioral30
Sample
captured_malware/P0weOPjsmVN5OCW.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral31
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win7-20240708-en
Behavioral task
behavioral32
Sample
captured_malware/YCUMy7OsLy2HRs6.exe
Resource
win10v2004-20241007-en
General
-
Target
captured_malware/EMU.exe
-
Size
1.1MB
-
MD5
9d950d95e33cda5789d549ae9f27d3a1
-
SHA1
f96003fff605e13c18773741878b0a9f1a03a4c6
-
SHA256
a09ad5ee3ef9214717004d7e8c2761a0a2f010e74755f4c99ab4be8d592794cc
-
SHA512
db04584c57392bb453c99ba9f6a614b62a9727b33f2e55c05766e5004b2086f47399b938161d292b6439f079624c03ac501d44428d8209a90ce61eae7cabdbab
-
SSDEEP
24576:xYHtb9SH7UHokfWOLVDtz/Pkg0n5f9l6PIYpbjb6:xYNbIUHokfrVtz/MD5FcxbH
Malware Config
Extracted
xloader
2.3
qn6g
kemtechonline.com
myjourneywithothers.com
pfifaq.com
vaziva-immo.net
thethickpick.com
sidvip.com
bidaleri.com
allginns.com
farmersystemofanalysis.com
shoponserendipity.com
expressdeliverybd.com
hargatoyota-malang.com
taichiforcalmess.com
lovewickcandlecompany.com
chrometoasterrv.com
chustozen.site
xiaofeizhi.com
nbzweb.xyz
tequenovegano.com
e-elearningconsultancy.com
foambelievable.com
nashvilleroofpro.com
pb-einvoicing.com
corkpinebuilders.com
mindyourbehind.com
urnasaurora.com
redai.run
inverphone.com
dropshipzen.com
squatrackforsale.com
worldanimaltransport.com
trexmaster.com
ifilmovie.com
toughpasswordgenerator.com
nuocvietnet.com
felaugh.com
mcafeefreedomcoin.com
igrejacelta.com
hongdaoqiye.com
fil-martime.com
solisdq.info
mission-fair.net
dramharbours.com
roof801.com
superbahis62.com
szly9188.com
olezarsen.com
sonthuduc.com
sweatandsparkledaily.com
ivaraa.com
teknotelhosting.com
lnxdex.com
casaenvero.com
investmentcommunities.com
lifeat6k.com
realerestate.com
tins.expert
photomodell.com
myfordbenefuts.com
creative-escort.com
3lidj.net
elenaircenter.com
hbtaste.com
8978299.com
simplebox.world
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral21/memory/2104-25-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral21/memory/1952-34-0x00000000000D0000-0x00000000000F8000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 3 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2848 powershell.exe 2780 powershell.exe 2176 powershell.exe -
Deletes itself 1 IoCs
pid Process 1092 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2368 set thread context of 2104 2368 EMU.exe 38 PID 2104 set thread context of 1252 2104 EMU.exe 21 PID 1952 set thread context of 1252 1952 explorer.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language EMU.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3004 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2104 EMU.exe 2104 EMU.exe 2848 powershell.exe 2780 powershell.exe 2176 powershell.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe 1952 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2104 EMU.exe 2104 EMU.exe 2104 EMU.exe 1952 explorer.exe 1952 explorer.exe -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2368 EMU.exe Token: SeDebugPrivilege 2104 EMU.exe Token: SeDebugPrivilege 2176 powershell.exe Token: SeDebugPrivilege 2780 powershell.exe Token: SeDebugPrivilege 2848 powershell.exe Token: SeDebugPrivilege 1952 explorer.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 2368 wrote to memory of 2848 2368 EMU.exe 31 PID 2368 wrote to memory of 2848 2368 EMU.exe 31 PID 2368 wrote to memory of 2848 2368 EMU.exe 31 PID 2368 wrote to memory of 2848 2368 EMU.exe 31 PID 2368 wrote to memory of 2780 2368 EMU.exe 33 PID 2368 wrote to memory of 2780 2368 EMU.exe 33 PID 2368 wrote to memory of 2780 2368 EMU.exe 33 PID 2368 wrote to memory of 2780 2368 EMU.exe 33 PID 2368 wrote to memory of 3004 2368 EMU.exe 35 PID 2368 wrote to memory of 3004 2368 EMU.exe 35 PID 2368 wrote to memory of 3004 2368 EMU.exe 35 PID 2368 wrote to memory of 3004 2368 EMU.exe 35 PID 2368 wrote to memory of 2176 2368 EMU.exe 37 PID 2368 wrote to memory of 2176 2368 EMU.exe 37 PID 2368 wrote to memory of 2176 2368 EMU.exe 37 PID 2368 wrote to memory of 2176 2368 EMU.exe 37 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 2368 wrote to memory of 2104 2368 EMU.exe 38 PID 1252 wrote to memory of 1952 1252 Explorer.EXE 41 PID 1252 wrote to memory of 1952 1252 Explorer.EXE 41 PID 1252 wrote to memory of 1952 1252 Explorer.EXE 41 PID 1252 wrote to memory of 1952 1252 Explorer.EXE 41 PID 1952 wrote to memory of 1092 1952 explorer.exe 42 PID 1952 wrote to memory of 1092 1952 explorer.exe 42 PID 1952 wrote to memory of 1092 1952 explorer.exe 42 PID 1952 wrote to memory of 1092 1952 explorer.exe 42
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2848
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wqvgFwuomLDukB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wqvgFwuomLDukB" /XML "C:\Users\Admin\AppData\Local\Temp\tmpB04C.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:3004
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wqvgFwuomLDukB.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2104
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2868
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\captured_malware\EMU.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1092
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5c68d298119d88a00a19492e574d16cc0
SHA125c60f31f74dfe291455c84761908a299f5c95e1
SHA256dbc074556cd4252778f7a58dc5f7880c0594eb5e30b3f8c46106be65e3dba944
SHA5122b2c8ec5a00c0fda05d1610ed3891cc0656d2ff533f21d044820fa11100eedd2fd5e7689eb54d82691f78aafee685c81d308c5f195bfa58ce10520bd67fa2871
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\3Y3UWQANIBL34XLGIZ26.temp
Filesize7KB
MD59f9b0de85697d528af9aab784fcbc3eb
SHA146813563bfe7df0aa04f33153333188a776079b4
SHA2560e0c80ea32451fc1821b081866f28c0d91751fe750866ea958fe2eb5db03e176
SHA512c9d157bd5bc7d74f851d889060155bf5f77f5ad76f420e7eacf152bcfc417e293e8194e3ed1db97aec1f3139bfc36eb257ed955189389089095e8671448b2550