Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 22:46
Static task
static1
Behavioral task
behavioral1
Sample
Ord20211310570045368963AC.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
Ord20211310570045368963AC.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral3
Sample
Ord20211310570045368964AL.exe
Resource
win7-20240221-en
General
-
Target
Ord20211310570045368963AC.exe
-
Size
585KB
-
MD5
f6fde8532e45bb49f3220e64c10d11a1
-
SHA1
4911c4d21a733ffa4990e2f00eab31106488fb85
-
SHA256
536cd8989d73b24ec397f603f3b509ec656febd8273c78ec576c200b5d09d063
-
SHA512
66931a5dd699970487164a434ce19e1ccaee8355cd1fbcedda9b3331106ed8e8b58d0a24c8272cacea29c5d930548cd324aa3c794186013398c5fac0f2805976
-
SSDEEP
12288:2aZPkBSBo79XgtOW5nuRI/+cEchvo3LKUWj9zKCUFRXgHe:ZZPPBHttd2cEcQ3LEj9Da+
Malware Config
Extracted
xloader
2.5
gab8
amateurfeetworship.com
big-food.biz
metaversevolution.com
profecional-pacasmayo.com
royzoom.com
bekindevolution.com
hokozaki.com
waltersswholesale.com
wayfinderacu.com
schnurrgallery.com
babygearrentals.net
imggtoken.club
24x7x366.com
lakiernictwo.info
les-cours.com
dwticket.com
onarollshades.com
ramireztradepartners.com
safarparfums.com
6ngie.info
hoedetamni.quest
europeangurl.com
sakhakot.com
franciscoalpizar.com
jsyysn.com
goldberg-lighting.com
symbebidas.online
aucoeurducadeau.com
diamondscaterers.com
surswain.quest
gequper.xyz
roytsb.com
332151.com
hienrenow.com
skullother.com
betnubhelp.com
donerightcleaningnation.info
noukou-tonkotsu.xyz
bulkysofthome.com
yuejiayouhua.com
sevillalimpieza.com
involvefinance.com
obz7mo9amu.com
niftyfashionreward.com
refunddngame.com
norllix.com
vergadercentrumdji.com
1006e.com
boraeresici.com
partnerbebefits.com
hejabbanifatemi.com
bigskypediatrics.com
thefortclub.com
blacksource.xyz
happyklikshop.com
fullamodatoptan.com
pinupcams.info
javnfts.com
duocvietpharmacy.com
babyfloki.tech
cequitycorp.com
frenziedflora.com
5cherries.com
slurcap.com
purodetalle.com
Signatures
-
Xloader payload 5 IoCs
resource yara_rule behavioral2/memory/1452-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1452-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1452-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2004-25-0x0000000000690000-0x00000000006B9000-memory.dmp xloader behavioral2/memory/2004-27-0x0000000000690000-0x00000000006B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 516 set thread context of 1452 516 Ord20211310570045368963AC.exe 93 PID 1452 set thread context of 3444 1452 Ord20211310570045368963AC.exe 57 PID 1452 set thread context of 3444 1452 Ord20211310570045368963AC.exe 57 PID 2004 set thread context of 3444 2004 chkdsk.exe 57 -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe 2004 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 1452 Ord20211310570045368963AC.exe 2004 chkdsk.exe 2004 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1452 Ord20211310570045368963AC.exe Token: SeDebugPrivilege 2004 chkdsk.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3444 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 516 wrote to memory of 1452 516 Ord20211310570045368963AC.exe 93 PID 516 wrote to memory of 1452 516 Ord20211310570045368963AC.exe 93 PID 516 wrote to memory of 1452 516 Ord20211310570045368963AC.exe 93 PID 516 wrote to memory of 1452 516 Ord20211310570045368963AC.exe 93 PID 516 wrote to memory of 1452 516 Ord20211310570045368963AC.exe 93 PID 516 wrote to memory of 1452 516 Ord20211310570045368963AC.exe 93 PID 3444 wrote to memory of 2004 3444 Explorer.EXE 96 PID 3444 wrote to memory of 2004 3444 Explorer.EXE 96 PID 3444 wrote to memory of 2004 3444 Explorer.EXE 96 PID 2004 wrote to memory of 4080 2004 chkdsk.exe 97 PID 2004 wrote to memory of 4080 2004 chkdsk.exe 97 PID 2004 wrote to memory of 4080 2004 chkdsk.exe 97
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\Ord20211310570045368963AC.exe"C:\Users\Admin\AppData\Local\Temp\Ord20211310570045368963AC.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:516 -
C:\Users\Admin\AppData\Local\Temp\Ord20211310570045368963AC.exe"C:\Users\Admin\AppData\Local\Temp\Ord20211310570045368963AC.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1452
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Ord20211310570045368963AC.exe"3⤵PID:4080
-
-