Analysis
-
max time kernel
51s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 18:14
Static task
static1
Behavioral task
behavioral1
Sample
df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe
Resource
win7-20240708-en
General
-
Target
df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe
-
Size
1008KB
-
MD5
062c34199a781027767c89c7a0570c66
-
SHA1
faf913de989dfbe50eebc5835c4cc622ab499679
-
SHA256
df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d
-
SHA512
97e6e88796383fac56e09e11afdcfd802f799fca142abdc362baa9605217213fa43647856b911b7db2ac521b934bca74e76940b599a8a5907a3d42916e145716
-
SSDEEP
24576:ocxWOmBGbzGUm5YejYHcZs+uyBT5MfUW0XRzqSknmwH:ocxIGbF8XYHcZEyBT52NgzqFmg
Malware Config
Extracted
xloader
2.5
gr3e
laomaody.com
rewilding.land
airtrackdevices.com
absel.zone
aname.xyz
corruptslofnq.xyz
chaikuo.com
kitpanelas10.com
fullnatura.com
lightingway.net
zahidrasool.com
clubfohl.com
edn-by-fges.com
salsacoop.com
youniquegal.com
sedbud.net
theoutsourcedea.com
neema.xyz
aprendacoreldrawdozero.com
nxstpix.space
crippleforpvh.xyz
glidehigh.education
sleighyourholidaypromo.com
moderndenmark.com
hltatami.com
makingitreignz.com
justintimenotary.net
wop.company
sooga.club
ecoalgo.xyz
400doultonct.com
garude.com
vinotrentino.info
all-blocks.com
bgoliyan.online
tmpk176.com
17776viarincon.com
sunflowerproducts.net
coinwalletmarket.com
mascaraudio.com
bobcathntshop.com
fortisfortuna.net
upjh-473byt.com
tiredlandlordblueprint.info
camluxflims.com
learningaswegrow.company
techharvesting.com
langnvren.com
farmasolutionspr.com
intenswine.com
asgodseesme.com
fast5ktomorrow.com
sextv88.com
shuffain.com
acuspireitsolutions.com
alihone11.info
ocrnv.com
findly.tech
beastnut.com
worryfreeworld.com
piecebin.com
macalgurg-uae.com
locksmith-waukesha.com
clixtextile.com
markazibnmubarak.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2844-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2844-15-0x00000000009F0000-0x0000000000CF3000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2568 set thread context of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 2844 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2568 wrote to memory of 2796 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 31 PID 2568 wrote to memory of 2796 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 31 PID 2568 wrote to memory of 2796 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 31 PID 2568 wrote to memory of 2796 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 31 PID 2568 wrote to memory of 2812 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 32 PID 2568 wrote to memory of 2812 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 32 PID 2568 wrote to memory of 2812 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 32 PID 2568 wrote to memory of 2812 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 32 PID 2568 wrote to memory of 2816 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 33 PID 2568 wrote to memory of 2816 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 33 PID 2568 wrote to memory of 2816 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 33 PID 2568 wrote to memory of 2816 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 33 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34 PID 2568 wrote to memory of 2844 2568 df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"2⤵PID:2796
-
-
C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"2⤵PID:2812
-
-
C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"2⤵PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"C:\Users\Admin\AppData\Local\Temp\df83a74d654a13dbbe99e13df00031e2ac70e741ed2765c5c5abb299c3dae89d.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2844
-