Analysis
-
max time kernel
149s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 03:14
Static task
static1
Behavioral task
behavioral1
Sample
SWIT BANK PAPER PAYMENT-pdf.exe
Resource
win7-20240221-en
General
-
Target
SWIT BANK PAPER PAYMENT-pdf.exe
-
Size
597KB
-
MD5
cb85be6f170d6b63c588f9cd5f13c353
-
SHA1
c7712175385971beeeff989d0b798033fcf7cd00
-
SHA256
ee929bc954e0c858ca17de372ed70ec02343b1c48ab6631c07c60550a8da7b4d
-
SHA512
86101fd4fd69fd15b950fb72d0c8a15cb1a0ff862590d06ccc34e2334ce6510fb4b21f58f7d062499ece0df045d4f83118b168776350f04a542b553ae575869d
-
SSDEEP
12288:NTfMGH02iNv4sX7yJDKY2E6gPSX2XrRbHVOzSm/rKP:pJH01usX7ykY2HgPSm710Om/
Malware Config
Extracted
xloader
2.3
ipa8
royalposhpups.com
univa.world
lanerbo.com
shopbabygo.com
theutahhomestore.com
serialmixer.icu
linfeiya.com
xn--12cg3de5c2eb5cyi.com
am-conseil-communication.com
dailygame168.com
therightmilitia.com
visions-agency.com
mapopi.com
frugallyketo.com
guapandglo.com
54w-x126v.net
your-health-kick.com
blockchainhub360.com
registernowhd.xyz
votekellykitashima.com
astyaviewer.com
kinnonstudio.com
calerie.coffee
oqity.com
ia3v0m.com
maryland-real-estates.com
rwaafd.com
mnavn.com
valhallamedics.com
realbetisbalompie.xyz
askaboutaduhelm.com
sazekav.com
jxhg163.com
littlescampers.com
northwayenterprise.com
miotir.com
pastelpastrybakery.com
thebandaiderepair.com
plastings.com
hubrisnewyork.com
mervperu.com
calvarirumba.com
evidencemetrics.com
privedenim.com
thebreedersbuddy.info
poolsnation.com
lessonex.com
bainrix.com
celiktarim.com
ortodonciaberistain.com
curtisbigelow.net
golfwifi.net
instrumentum.store
legacymediaentertainment.com
okwideus.com
rixmusic.com
best123-movies.com
edwardsrealtyfl.rentals
beaumontcycleworks.com
abolad.com
hydrarobuxobby.com
addisonbleu.com
xiang-life.net
tailored2fit.online
desarrollosolucionesnavarro.com
Signatures
-
Xloader payload 2 IoCs
Processes:
resource yara_rule behavioral1/memory/3060-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3060-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
Processes:
SWIT BANK PAPER PAYMENT-pdf.exeSWIT BANK PAPER PAYMENT-pdf.exedescription pid process target process PID 2960 set thread context of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 3060 set thread context of 1388 3060 SWIT BANK PAPER PAYMENT-pdf.exe Explorer.EXE -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2088 2404 WerFault.exe msiexec.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SWIT BANK PAPER PAYMENT-pdf.exepid process 3060 SWIT BANK PAPER PAYMENT-pdf.exe 3060 SWIT BANK PAPER PAYMENT-pdf.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
Processes:
SWIT BANK PAPER PAYMENT-pdf.exepid process 3060 SWIT BANK PAPER PAYMENT-pdf.exe 3060 SWIT BANK PAPER PAYMENT-pdf.exe 3060 SWIT BANK PAPER PAYMENT-pdf.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
SWIT BANK PAPER PAYMENT-pdf.exeExplorer.EXEdescription pid process Token: SeDebugPrivilege 3060 SWIT BANK PAPER PAYMENT-pdf.exe Token: SeShutdownPrivilege 1388 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
SWIT BANK PAPER PAYMENT-pdf.exeExplorer.EXEmsiexec.exedescription pid process target process PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 2960 wrote to memory of 3060 2960 SWIT BANK PAPER PAYMENT-pdf.exe SWIT BANK PAPER PAYMENT-pdf.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 1388 wrote to memory of 2404 1388 Explorer.EXE msiexec.exe PID 2404 wrote to memory of 2088 2404 msiexec.exe WerFault.exe PID 2404 wrote to memory of 2088 2404 msiexec.exe WerFault.exe PID 2404 wrote to memory of 2088 2404 msiexec.exe WerFault.exe PID 2404 wrote to memory of 2088 2404 msiexec.exe WerFault.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SWIT BANK PAPER PAYMENT-pdf.exe"C:\Users\Admin\AppData\Local\Temp\SWIT BANK PAPER PAYMENT-pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\SWIT BANK PAPER PAYMENT-pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 2723⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1388-27-0x0000000006CA0000-0x0000000006D80000-memory.dmpFilesize
896KB
-
memory/1388-20-0x0000000006CA0000-0x0000000006D80000-memory.dmpFilesize
896KB
-
memory/2404-21-0x00000000001F0000-0x0000000000204000-memory.dmpFilesize
80KB
-
memory/2404-22-0x00000000001F0000-0x0000000000204000-memory.dmpFilesize
80KB
-
memory/2404-24-0x00000000001F0000-0x0000000000204000-memory.dmpFilesize
80KB
-
memory/2960-3-0x0000000001DA0000-0x0000000001DA8000-memory.dmpFilesize
32KB
-
memory/2960-6-0x0000000007E90000-0x0000000007F10000-memory.dmpFilesize
512KB
-
memory/2960-7-0x0000000004110000-0x000000000413E000-memory.dmpFilesize
184KB
-
memory/2960-5-0x0000000004A90000-0x0000000004AD0000-memory.dmpFilesize
256KB
-
memory/2960-4-0x0000000074030000-0x000000007471E000-memory.dmpFilesize
6.9MB
-
memory/2960-0-0x00000000002C0000-0x000000000035C000-memory.dmpFilesize
624KB
-
memory/2960-2-0x0000000004A90000-0x0000000004AD0000-memory.dmpFilesize
256KB
-
memory/2960-15-0x0000000074030000-0x000000007471E000-memory.dmpFilesize
6.9MB
-
memory/2960-1-0x0000000074030000-0x000000007471E000-memory.dmpFilesize
6.9MB
-
memory/3060-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/3060-19-0x0000000000220000-0x0000000000230000-memory.dmpFilesize
64KB
-
memory/3060-18-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3060-16-0x0000000000A00000-0x0000000000D03000-memory.dmpFilesize
3.0MB
-
memory/3060-14-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3060-10-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/3060-8-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB