Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
31-12-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe
Resource
win7-20240903-en
General
-
Target
10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe
-
Size
1008KB
-
MD5
79f75d04c7db5ecb07bae08e762a4670
-
SHA1
fd81c94d3826c99423924c473738b0e549782661
-
SHA256
10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7a
-
SHA512
7d71c2371f6a696424d8ab7413492c8431ad4262d82e4a62f4a9a4378815021c2f3d520de162f78182ef1a6022ad7a1cc892f0531b6e2a591f772271ffcc9cac
-
SSDEEP
24576:ocxWOmBGbzGUm5YejYHcZs+uyBT5MfUW0XRzqSknmw:ocxIGbF8XYHcZEyBT52NgzqFm
Malware Config
Extracted
xloader
2.5
gr3e
laomaody.com
rewilding.land
airtrackdevices.com
absel.zone
aname.xyz
corruptslofnq.xyz
chaikuo.com
kitpanelas10.com
fullnatura.com
lightingway.net
zahidrasool.com
clubfohl.com
edn-by-fges.com
salsacoop.com
youniquegal.com
sedbud.net
theoutsourcedea.com
neema.xyz
aprendacoreldrawdozero.com
nxstpix.space
crippleforpvh.xyz
glidehigh.education
sleighyourholidaypromo.com
moderndenmark.com
hltatami.com
makingitreignz.com
justintimenotary.net
wop.company
sooga.club
ecoalgo.xyz
400doultonct.com
garude.com
vinotrentino.info
all-blocks.com
bgoliyan.online
tmpk176.com
17776viarincon.com
sunflowerproducts.net
coinwalletmarket.com
mascaraudio.com
bobcathntshop.com
fortisfortuna.net
upjh-473byt.com
tiredlandlordblueprint.info
camluxflims.com
learningaswegrow.company
techharvesting.com
langnvren.com
farmasolutionspr.com
intenswine.com
asgodseesme.com
fast5ktomorrow.com
sextv88.com
shuffain.com
acuspireitsolutions.com
alihone11.info
ocrnv.com
findly.tech
beastnut.com
worryfreeworld.com
piecebin.com
macalgurg-uae.com
locksmith-waukesha.com
clixtextile.com
markazibnmubarak.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2676-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2676-14-0x0000000000A70000-0x0000000000D73000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2460 set thread context of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2676 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31 PID 2460 wrote to memory of 2676 2460 10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe"C:\Users\Admin\AppData\Local\Temp\10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe"C:\Users\Admin\AppData\Local\Temp\10a0c979597a5ef1031499dad7ac2123791361dd24a1f2e20f42bb378a2ebe7aN.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-