Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
25-12-2024 12:44
Static task
static1
Behavioral task
behavioral1
Sample
2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe
Resource
win7-20240903-en
General
-
Target
2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe
-
Size
495KB
-
MD5
1d4fd5f9ce67b9701527fe44c5c01328
-
SHA1
cd0b4fb2f1ba6d54310cd4cad70e375c7da3e5ef
-
SHA256
2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0
-
SHA512
e43d10db454ab5d025f5043812c0ad116102b09230bb1b1e72760d000f9de41b172e1d6bccc05b5504fcf67ec0a2620275f85078f4adc3d7b2ec433ac498b0f5
-
SSDEEP
12288:3gfm1GNmrNm2r5t8v+vtrqt6QuQnKTrMqTUcvJbNm:mgHkSt0+vtBTrpUci
Malware Config
Extracted
xloader
2.5
mwfc
a-great-intl-voip-phones.zone
police-trust-security.com
415391.com
coi-sl.com
liming-steel.com
criticalracetheoryexplained.com
pintoent.com
columbusrx.com
clarktribe.net
texasforblanchard.com
musical.voyage
priyamblogs.com
employbridge.works
americanchessmaster.com
australiaaddictioncenters.com
drkell-yann.xyz
barryisdaner.com
frankkystein.art
aromatoto7.com
alsuwal.com
dmsolutionsco.com
learnwithvr.net
bigsouthfiresafety.com
atthelastmoment.com
ktnpan.xyz
xinhuishaoyu.com
humanlydivine.com
exitin90.com
wzly.top
blockzcoin.com
edm69.net
bewitchedkit.com
alpeshpate.com
realbeaches.com
bluejaerial.com
amazonjp-securities.net
forbeautii.com
kincsemto.net
playandwin-with-o-tentic.com
herauniversal.com
acs-storage.com
riulaza.com
bedrocksolution.net
xn--latamazulea-beb.com
deniyayatea.com
bubbledenterprise.com
ternopil.agency
freeminingboxes.com
suddennnnnnnnnnnn35.xyz
firstparkcondos.com
starpointeartsacademy.com
3ptsstore.com
cryptocurrencyscamreport.com
helennbendiss47.xyz
intergoldenstateautosales.com
lsmith.xyz
cuantiao.com
xn--z92b76hzfnc1y211an8i78t.com
noon21-203.com
boardsnourhood.com
toddlyonsfishing.com
levancanh.xyz
siteahan.com
winsportgame.club
malagainvestments.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2148-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2148-16-0x0000000000830000-0x0000000000B33000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2820 set thread context of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2148 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31 PID 2820 wrote to memory of 2148 2820 2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe"C:\Users\Admin\AppData\Local\Temp\2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe"C:\Users\Admin\AppData\Local\Temp\2869e0c3e746c3baa787fb20464d3b4b286591d96f1ea89b8d852bcae32f4ef0.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2148
-