Analysis
-
max time kernel
106s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
26/03/2025, 20:53
Static task
static1
Behavioral task
behavioral1
Sample
53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe
Resource
win7-20240903-en
General
-
Target
53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe
-
Size
839KB
-
MD5
f5ffaae6be1c826e53cbd033f83d5c8e
-
SHA1
6bfd67c6bca69df6ed4f0d20842ab4ebdfafcde4
-
SHA256
53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8
-
SHA512
afc22067d485940f4699076389e3329b5823ebc96d88224cecab2f343a6a113586a8e7eb8f69134c3fe5277660d6297d5e0673e2972734b085d61bb2fd22ffd1
-
SSDEEP
12288:xbkNnMdUO4rvcMZKwangiFPWY/mnM44ZVA0hj+22etupDboQcNdhVACRYeK8LX:m6j4rvrKwang6WCxVA0dOGMDvcNdMX
Malware Config
Extracted
xloader
2.1
nwrr
mentalsafariwithmari.com
emveenterprise.com
antivirus-zastita.com
aonetiger.com
alfexx2.website
overstockalpine.com
navigateoffroad.com
upscaleboxes.com
sailboatvn.com
poemoca.com
saildeskservices.com
recoveryrhode.coach
dmgbreastcare.com
objectuu.com
lynxatifs.com
brevetti-ai.com
salamtak.life
theharmesteam.com
hopeharboracademy.com
foodandfitnesschannel.com
brite.info
jfaudiovisual.com
qa4dra.com
stylezntingz.com
realtorfrance.com
toughcenter.com
5payto.com
fogghocl.com
melindamerk.com
jmjconsultores.com
isocomindustries.com
getmicrocredit.com
solisdq.info
luxuryic.com
sandysessentials.net
ecgmtl.com
bandb2.com
touchdowntequila.net
die-band.com
elitemustangshop.com
preciousmetals.supply
pt-mind.com
employerbrandstudio.site
interholc.com
bkwashrepair.com
kingclevertshirts.com
leadgenroi.com
minikin-reformation.info
hypnoselagny.com
xicahbqs.com
simonjblack.com
chantix.sucks
geralowarszuine.com
shubiaodian.xyz
twolinedesign.com
egov-e-cimer.com
screenagems.com
usebar.xyz
fayp333.icu
traxtar.com
cdtyjg666.com
mobilelegends-bangbang.com
shopatmove.com
exquisite4adults.com
revitalizedmassages.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3512-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2332 set thread context of 3512 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 86 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 3512 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 3512 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2332 wrote to memory of 3512 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 86 PID 2332 wrote to memory of 3512 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 86 PID 2332 wrote to memory of 3512 2332 53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe"C:\Users\Admin\AppData\Local\Temp\53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe"C:\Users\Admin\AppData\Local\Temp\53425ac47307e7d6e98deae06742bfebdade503bf6e48766a84ea52a3045f3a8.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3512
-