Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
26/03/2025, 10:26
Static task
static1
Behavioral task
behavioral1
Sample
f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe
Resource
win7-20240903-en
General
-
Target
f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe
-
Size
890KB
-
MD5
ce9456b4b5deccd2f6d9465482326a4a
-
SHA1
c8e3393bdda11aab1ede3b0f73390891fb4cd379
-
SHA256
f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1
-
SHA512
a4dfd7edac6afde39b942dd18ebb80f0b91be948bffc73a07ad61668d4e83b9e622b498560a5a296cac21e1ddd6a39da5b1006ce4dfd04008062ffcad9142b6b
-
SSDEEP
12288:+VKdZyObtOG0OHttZpOohFSsymCpiuyWKNpaj31N7r+9o6YfBBqN8LX:+VMHwG0ON514iuyWEpaj+nYpg
Malware Config
Extracted
xloader
2.1
dn87
yiyuge.club
sdzrwoe.icu
divifarsi.com
sunsal.net
animeziyan.com
onlinemastersdegree.site
medknizhka.info
lowlife.one
livingroomexercise.com
themantrini.com
starconverters.com
kyssclothing.com
sa18i.art
smartdaymall.com
ohyeahblog.net
losriosnosunen.com
joannamarshwriter.com
restlanekysseoffer.com
oonabody.com
azarksigningagent.com
lamrangthammy.com
thejjluxe.com
ethereumlimitedpartners.com
palsarcapital.com
basleyservices.com
acdreformaemgeral.com
koddizayn.com
onfunerals.net
youthsdictionary.com
ppc-listing.info
inspiretravelspakistan.com
backyardsuperstar.com
sjtyy120.com
4wyy.com
sapphiresour.com
yourmatch.club
hardrock.site
hochfranken-feuilleton.net
duanesloancpa.com
nowitek.com
catfishscience.com
atg.solar
buricolo.com
digitalgv.com
thenxtfranchise.com
kamenjoy.com
celebrencuba.com
thewellnesszindagi.com
thebrewhahacomedyclub.com
hepsiburadarezaleti.xyz
xpresslogin.com
costadosolfilm.com
suho-peru.com
escoladearquitetura.com
kppky.com
creditfitclub.net
territorystorage.com
vitruviuswealth.com
myofascialreleaseatl.com
skrimcolours.com
mehmetziyattintokar.com
associationmemorial.com
dabbingdales.com
nungufoods.com
gmigroups.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral1/memory/2676-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2092 set thread context of 2676 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe 2676 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2092 wrote to memory of 2676 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe 30 PID 2092 wrote to memory of 2676 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe 30 PID 2092 wrote to memory of 2676 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe 30 PID 2092 wrote to memory of 2676 2092 f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe"C:\Users\Admin\AppData\Local\Temp\f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe"C:\Users\Admin\AppData\Local\Temp\f413624c125a8e6e6e8f4ece883a646fe784bc5a8f4f21185da1df43adc76da1.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:2676
-