Analysis
-
max time kernel
147s -
max time network
178s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
21-07-2021 15:49
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE ORDER 72121.exe
Resource
win7v20210410
General
-
Target
PURCHASE ORDER 72121.exe
-
Size
661KB
-
MD5
a5964d858bf1688f2de5746ec08dabf5
-
SHA1
26e09b1f04394ff24d59c353c0d46b54afd8d363
-
SHA256
c1ac4c50a78b858365062dc71a9fe5f3a3bdf39b4d8902b1f8311f2c2a86064b
-
SHA512
bbd68474c00caaf56d82ddc688d6e523976b020736ab848683fcdbc5c647f36e52121b09866540bc3253ad4e86bc260be3e99886fc519a405e04e24ac13d4bb4
Malware Config
Extracted
xloader
2.3
http://www.appackersandmoversbengaluru.com/p4se/
weightlossforprofessionals.com
talkotstopandshop.com
everesttechsolutions.com
garboarts.com
esubastas-online.com
electriclastmile.com
tomio.tech
jacoty.com
knot-tied-up.com
energychoicesim.com
rocketcompaniessham.com
madarasapattinam.com
promosplace.com
newstarchurch.com
thesaleskitchen.com
slingmodeinc.com
jobresulthub.com
pillclk.com
shipu119.com
sibalcar.com
quotovate.com
bluecoyotecontracting.com
hc68kr.com
laundry39.com
vietthaivt.com
ikonflorida.com
xn--sm2b97e.com
innovisional.co.uk
spacecityscouples.com
slmccallum.com
hro41.com
theyardcardzstore.com
primewildlife.com
xn--seranderturzm-ebc.com
stilesandhansen.com
bvlesty.com
hejiayin.com
philosophersdojo.com
aworldofsofas.com
itile.net
unitronicdealers.com
savasoguz.com
magetu.info
devgmor.com
villasabai.com
pipipenguin.com
furnishessentials.com
patchmonitoring.com
michaelhumphriesrealestate.com
pratikahealth.com
caswellcu.com
lakeportal.com
weedyourmind.com
cardamommm.com
freshstartrestorationllcmd.com
mastercardbhdleon.com
ceramiccottageco.com
magiczneszkielka.com
casebookconnet.com
recharge.directory
phoneprivacyscreen.com
mumbaindicator.com
jumboprovacy.com
streamerdojo.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/592-65-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/592-66-0x000000000041D0F0-mapping.dmp xloader behavioral1/memory/1148-73-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1112 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
PURCHASE ORDER 72121.exePURCHASE ORDER 72121.exechkdsk.exedescription pid process target process PID 1836 set thread context of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 592 set thread context of 1208 592 PURCHASE ORDER 72121.exe Explorer.EXE PID 1148 set thread context of 1208 1148 chkdsk.exe Explorer.EXE -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
PURCHASE ORDER 72121.exechkdsk.exepid process 592 PURCHASE ORDER 72121.exe 592 PURCHASE ORDER 72121.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe 1148 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
PURCHASE ORDER 72121.exechkdsk.exepid process 592 PURCHASE ORDER 72121.exe 592 PURCHASE ORDER 72121.exe 592 PURCHASE ORDER 72121.exe 1148 chkdsk.exe 1148 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
PURCHASE ORDER 72121.exechkdsk.exedescription pid process Token: SeDebugPrivilege 592 PURCHASE ORDER 72121.exe Token: SeDebugPrivilege 1148 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
PURCHASE ORDER 72121.exeExplorer.EXEchkdsk.exedescription pid process target process PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1836 wrote to memory of 592 1836 PURCHASE ORDER 72121.exe PURCHASE ORDER 72121.exe PID 1208 wrote to memory of 1148 1208 Explorer.EXE chkdsk.exe PID 1208 wrote to memory of 1148 1208 Explorer.EXE chkdsk.exe PID 1208 wrote to memory of 1148 1208 Explorer.EXE chkdsk.exe PID 1208 wrote to memory of 1148 1208 Explorer.EXE chkdsk.exe PID 1148 wrote to memory of 1112 1148 chkdsk.exe cmd.exe PID 1148 wrote to memory of 1112 1148 chkdsk.exe cmd.exe PID 1148 wrote to memory of 1112 1148 chkdsk.exe cmd.exe PID 1148 wrote to memory of 1112 1148 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 72121.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 72121.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 72121.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 72121.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:592
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 72121.exe"3⤵
- Deletes itself
PID:1112
-
-