Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
Quotation 85663455.exe
Resource
win7-20240221-en
General
-
Target
Quotation 85663455.exe
-
Size
769KB
-
MD5
78a48c9ca7cb69737740772bfbff1db7
-
SHA1
2079cb5fc6559e71f264144c92132a5a4e174962
-
SHA256
64550a0d3d1c28b1ec50006327a707b7287997aa7ca146153440935a033ccb97
-
SHA512
710356de5059511b606a553675427b905822bc8ee19bfec3d2ad903d1c22265f69273ab59e5b27d092bac088719de43e61ebd2ed67ccb426bdc9eea02eddc971
-
SSDEEP
12288:2ToRXAGxYR+PMnf2EKXNzo/Yvf3CJDvrHzuaImz1NZ1eCiHUQhnmw2o5f5JOEPpQ:AoRXcRH2XzgYvvCpzXIwLiFnl2IRHPi
Malware Config
Extracted
xloader
2.3
m7gs
goodxxxhigh.com
blun33.com
mcbt328.com
sxtdba.com
sagalocal.icu
spentonindustries.com
greatexpectationssouthshore.com
herzenco.com
duoxizhe.com
h-mawari.net
jeevicain.com
sculpted-vegan.net
vipchainwallet.com
smartanalytics.info
jiujirat.com
canhoquan8-centralpremium.com
pasarandir.com
mario17331.com
dillonsavage.com
ladiesboxx.com
theskinnytype.com
nucanmaple.com
studiotaimdesign.com
slideclubpolo.com
letsmovevietnam.com
nguoivosu.com
jesus-couture.com
xawtjd.com
admin-pethnampong.com
gcpwi.com
t-storms1.com
unesalleobscure.com
laura-claim.com
epc-scot.com
aqhuayuan.com
incredihomes.com
grptradinggold.com
kalotemo.com
sieuphamnaga.club
alabaj.info
butwhatdidyoulearn.com
madhurbazar.website
mrgreenwayhome.com
nowprepared.net
stealthshop.net
pinktoiletpaper.com
campershop-ec.com
greatnwrates.info
816savillerowterrace.com
bebonzer.com
centrdina.com
surveyfind4.club
doicard365.com
fitfromhomestore.com
festivalsofkerala.com
businessbison.com
ismailonline.com
coastebikes.com
jacobhirata.com
mordernhealth.com
xn--80ailshehb3a.xn--p1acf
homcraftz.com
votegoat.vote
radiobenditaesperanza.net
irelandmotorsports.co.uk
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2588-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2588-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2388-21-0x0000000000080000-0x00000000000A9000-memory.dmp xloader behavioral1/memory/2388-23-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2292 set thread context of 2588 2292 Quotation 85663455.exe 30 PID 2588 set thread context of 1200 2588 Quotation 85663455.exe 21 PID 2388 set thread context of 1200 2388 NAPSTAT.EXE 21 -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2588 Quotation 85663455.exe 2588 Quotation 85663455.exe 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2588 Quotation 85663455.exe 2588 Quotation 85663455.exe 2588 Quotation 85663455.exe 2388 NAPSTAT.EXE 2388 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2588 Quotation 85663455.exe Token: SeDebugPrivilege 2388 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 2292 wrote to memory of 2588 2292 Quotation 85663455.exe 30 PID 1200 wrote to memory of 2388 1200 Explorer.EXE 31 PID 1200 wrote to memory of 2388 1200 Explorer.EXE 31 PID 1200 wrote to memory of 2388 1200 Explorer.EXE 31 PID 1200 wrote to memory of 2388 1200 Explorer.EXE 31 PID 2388 wrote to memory of 2696 2388 NAPSTAT.EXE 32 PID 2388 wrote to memory of 2696 2388 NAPSTAT.EXE 32 PID 2388 wrote to memory of 2696 2388 NAPSTAT.EXE 32 PID 2388 wrote to memory of 2696 2388 NAPSTAT.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2588
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"3⤵
- Deletes itself
PID:2696
-
-