Analysis
-
max time kernel
45s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
25/03/2025, 04:02
Static task
static1
Behavioral task
behavioral1
Sample
15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe
Resource
win7-20241010-en
General
-
Target
15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe
-
Size
675KB
-
MD5
ba2ad8e5ad780bd8024ffadc7f2d76e9
-
SHA1
71dd5d11f101b56628bc7949a0e32ff0ead01af8
-
SHA256
15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7
-
SHA512
b283fdf4ce548412eeb920cd9d1fce43026857dec34a189853ef8f0a94b7c6495d96e974334d84b35bcc38dce7a1dd74aeeaafaba5e59644354d73edf870aacb
-
SSDEEP
12288:M+iri2d2mjMap3Bp1nQu4EonieFN2Mk+2vp51/wdzoGygQgJ+m4M4:qri8ukP1nQOonvwt7psygv
Malware Config
Extracted
xloader
2.1
dn87
yiyuge.club
sdzrwoe.icu
divifarsi.com
sunsal.net
animeziyan.com
onlinemastersdegree.site
medknizhka.info
lowlife.one
livingroomexercise.com
themantrini.com
starconverters.com
kyssclothing.com
sa18i.art
smartdaymall.com
ohyeahblog.net
losriosnosunen.com
joannamarshwriter.com
restlanekysseoffer.com
oonabody.com
azarksigningagent.com
lamrangthammy.com
thejjluxe.com
ethereumlimitedpartners.com
palsarcapital.com
basleyservices.com
acdreformaemgeral.com
koddizayn.com
onfunerals.net
youthsdictionary.com
ppc-listing.info
inspiretravelspakistan.com
backyardsuperstar.com
sjtyy120.com
4wyy.com
sapphiresour.com
yourmatch.club
hardrock.site
hochfranken-feuilleton.net
duanesloancpa.com
nowitek.com
catfishscience.com
atg.solar
buricolo.com
digitalgv.com
thenxtfranchise.com
kamenjoy.com
celebrencuba.com
thewellnesszindagi.com
thebrewhahacomedyclub.com
hepsiburadarezaleti.xyz
xpresslogin.com
costadosolfilm.com
suho-peru.com
escoladearquitetura.com
kppky.com
creditfitclub.net
territorystorage.com
vitruviuswealth.com
myofascialreleaseatl.com
skrimcolours.com
mehmetziyattintokar.com
associationmemorial.com
dabbingdales.com
nungufoods.com
gmigroups.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/644-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2100 set thread context of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 644 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30 PID 2100 wrote to memory of 644 2100 15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe"C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe"{path}"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:644
-