Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 18:33
Static task
static1
Behavioral task
behavioral1
Sample
2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe
Resource
win7-20240903-en
General
-
Target
2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe
-
Size
519KB
-
MD5
b5cca9a0d4517e73fa2bb17c9f77f164
-
SHA1
5c654175925084aa0440be0fc54fe81fc52b4c38
-
SHA256
2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863
-
SHA512
537bcae22b77c5b2b6b650e4a7437cc5c5a5a3635e98b0f8053c62026d312c0d0208aa923d75cd2b19151adc1773e980d88634d2afada560d29ca3ae529f0bdb
-
SSDEEP
12288:xkKkRwmjQt+TPbV7G/2Q3Aaz6ZTleAlRH5i:xkKkRwmjQ4TPb3uA00leAD5
Malware Config
Extracted
xloader
2.6
oeir
blueryu.net
cindyfernanda.com
eparchys.info
suzettebrissettcreatives.com
lifesuccesspros.com
vasprovider.online
thedencannabis.info
superfashionkitty.com
yhhj66.top
plfashiongroup.online
pandemicky.xyz
glendorahc.com
2-3xevent.pro
ig-canlidestek.com
svavw.online
cadforcpq.com
my-happinessgoals.com
iledulahaut.com
ycvibecheck.com
minmarket.online
kulmcountryclub.com
zhenshishijie.com
undergroundcasebreaks.net
cwa01.com
wavbrowser.com
shopifycvip.com
3-1230marenger.com
wmzhe.xyz
eartheas.com
sac-paris.fr
nexgencosolesandrinks.com
shanguoyuan.com
business-resilience.info
ffs-agents.com
962723.com
juanreales.com
ellisbaker.com
xd0d7rx0bj7unq.xyz
smonique.com
goodmanfowlercambs.com
com-ic.info
mrbscbd.com
backtraxusa.com
otomapcorp.com
empresarica.com
factorytakayama.net
rodolfo-martinez.com
asteroidss.com
zhuanyebaojie.com
66hao.xyz
bewellpeople.com
921293.com
carribeangingerbar.com
clubyer.com
recomposed.info
suredryroof.com
nolanleist.com
bravoltdinc.com
americanmotors1.com
pvckablokanali.com
postcardceo.com
bulongbulungan.com
looping.viajes
deph.xyz
pnx2022.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/1668-19-0x0000000000600000-0x000000000062B000-memory.dmp xloader -
Executes dropped EXE 1 IoCs
pid Process 1668 AddInProcess32.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1948 set thread context of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90 -
Program crash 1 IoCs
pid pid_target Process procid_target 1396 1668 WerFault.exe 90 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1948 wrote to memory of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90 PID 1948 wrote to memory of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90 PID 1948 wrote to memory of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90 PID 1948 wrote to memory of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90 PID 1948 wrote to memory of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90 PID 1948 wrote to memory of 1668 1948 2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe"C:\Users\Admin\AppData\Local\Temp\2a54f922d3496201e6a737344cbf6cac0c1803a59cf4ce3111c831c32e1ce863.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"2⤵
- Executes dropped EXE
PID:1668 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1668 -s 1843⤵
- Program crash
PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 1668 -ip 16681⤵PID:832
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD59827ff3cdf4b83f9c86354606736ca9c
SHA1e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723
SHA256c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a
SHA5128261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579