Analysis
-
max time kernel
145s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 00:31
Static task
static1
Behavioral task
behavioral1
Sample
PI2009153.exe
Resource
win7-20240708-en
General
-
Target
PI2009153.exe
-
Size
435KB
-
MD5
2261b6b87980a9fe9d22499c32af581a
-
SHA1
ad538af5295f9b670f3bc23c6d4c3bf79d388572
-
SHA256
a6ec6fd1e4c0673bde9231a68752edca4fb9fda60e342cd735ff53729d262da8
-
SHA512
600416010f13514e3faa2fdda94df93ae89b6f964381ee02c1a9a982a6aaec2c823bb7235b57bee33ab5c8e07f89293c1ca988f9f772e5da207f3d8336fcbde9
-
SSDEEP
12288:aZ41MVuZj2uUPrxLfCl2/reQIh2+J6tzyvscuPbR:aZ9VUfCrxjCUeFh2+JWuvscER
Malware Config
Extracted
xloader
2.1
8ah
outcrewz.com
superstormkleenup.com
onewildmermaid.com
awhvh.com
fundacionamoryesperanza.com
raisingabbi.com
peersonpurpose.com
brasilliana.com
bkkshutter68.com
revistaartesanato.net
machadiet.com
hurricanefloodcleaning.com
poshmargarita.life
skyhighet.com
letsgetrealyyc.com
wiringplusllc.com
news3105.pictures
huaxiangyan.com
telesecretariat-medical.com
imcc-j.com
jlsignaturemusic.com
rbdia.com
produsensarungmobil.com
mybfcu.com
citgo.energy
nathangivesback.com
trawli.com
thedivinemessengercourse.com
hrat.ltd
rgogr.com
marchwithmina.com
blakbakk.win
200579.top
coreymfisher.com
mytrado.info
stamfordmemoriesgateway.com
jaimemonentreprise.net
priapedia.com
stormharbourenergy.com
95664111.net
basictraxx.com
eliangwang.com
veterinariapichichus.com
kindergarden.info
kingofkingsco.com
ciphergain.com
414opebet.com
yizhijiemi.com
allstar.coupons
realestatephotobymila.com
995vpu.info
javierandchanteywedding.com
039manx.com
lowermypgebill.com
rt09gip.com
alexthatsme.com
numizmat-rnd.com
pursuingvanity.com
tytrbj.com
autismlocal.com
deliciousvillefoods.com
spliffbarcelona.com
vesevica.com
bxglz2.com
mage-cart.info
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2732-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2732-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2732-20-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2764-27-0x0000000000070000-0x0000000000098000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2620 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2100 set thread context of 2732 2100 PI2009153.exe 31 PID 2732 set thread context of 1272 2732 PI2009153.exe 21 PID 2732 set thread context of 1272 2732 PI2009153.exe 21 PID 2764 set thread context of 1272 2764 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PI2009153.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2732 PI2009153.exe 2732 PI2009153.exe 2732 PI2009153.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe 2764 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2732 PI2009153.exe 2732 PI2009153.exe 2732 PI2009153.exe 2732 PI2009153.exe 2764 wscript.exe 2764 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2732 PI2009153.exe Token: SeDebugPrivilege 2764 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 2100 wrote to memory of 2732 2100 PI2009153.exe 31 PID 1272 wrote to memory of 2764 1272 Explorer.EXE 32 PID 1272 wrote to memory of 2764 1272 Explorer.EXE 32 PID 1272 wrote to memory of 2764 1272 Explorer.EXE 32 PID 1272 wrote to memory of 2764 1272 Explorer.EXE 32 PID 2764 wrote to memory of 2620 2764 wscript.exe 33 PID 2764 wrote to memory of 2620 2764 wscript.exe 33 PID 2764 wrote to memory of 2620 2764 wscript.exe 33 PID 2764 wrote to memory of 2620 2764 wscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Users\Admin\AppData\Local\Temp\PI2009153.exe"C:\Users\Admin\AppData\Local\Temp\PI2009153.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\PI2009153.exe"C:\Users\Admin\AppData\Local\Temp\PI2009153.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2732
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PI2009153.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2620
-
-