Analysis
-
max time kernel
161s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
18-04-2024 19:19
Static task
static1
Behavioral task
behavioral1
Sample
Quotation 85663455.exe
Resource
win7-20240221-en
General
-
Target
Quotation 85663455.exe
-
Size
769KB
-
MD5
78a48c9ca7cb69737740772bfbff1db7
-
SHA1
2079cb5fc6559e71f264144c92132a5a4e174962
-
SHA256
64550a0d3d1c28b1ec50006327a707b7287997aa7ca146153440935a033ccb97
-
SHA512
710356de5059511b606a553675427b905822bc8ee19bfec3d2ad903d1c22265f69273ab59e5b27d092bac088719de43e61ebd2ed67ccb426bdc9eea02eddc971
-
SSDEEP
12288:2ToRXAGxYR+PMnf2EKXNzo/Yvf3CJDvrHzuaImz1NZ1eCiHUQhnmw2o5f5JOEPpQ:AoRXcRH2XzgYvvCpzXIwLiFnl2IRHPi
Malware Config
Extracted
xloader
2.3
m7gs
goodxxxhigh.com
blun33.com
mcbt328.com
sxtdba.com
sagalocal.icu
spentonindustries.com
greatexpectationssouthshore.com
herzenco.com
duoxizhe.com
h-mawari.net
jeevicain.com
sculpted-vegan.net
vipchainwallet.com
smartanalytics.info
jiujirat.com
canhoquan8-centralpremium.com
pasarandir.com
mario17331.com
dillonsavage.com
ladiesboxx.com
theskinnytype.com
nucanmaple.com
studiotaimdesign.com
slideclubpolo.com
letsmovevietnam.com
nguoivosu.com
jesus-couture.com
xawtjd.com
admin-pethnampong.com
gcpwi.com
t-storms1.com
unesalleobscure.com
laura-claim.com
epc-scot.com
aqhuayuan.com
incredihomes.com
grptradinggold.com
kalotemo.com
sieuphamnaga.club
alabaj.info
butwhatdidyoulearn.com
madhurbazar.website
mrgreenwayhome.com
nowprepared.net
stealthshop.net
pinktoiletpaper.com
campershop-ec.com
greatnwrates.info
816savillerowterrace.com
bebonzer.com
centrdina.com
surveyfind4.club
doicard365.com
fitfromhomestore.com
festivalsofkerala.com
businessbison.com
ismailonline.com
coastebikes.com
jacobhirata.com
mordernhealth.com
xn--80ailshehb3a.xn--p1acf
homcraftz.com
votegoat.vote
radiobenditaesperanza.net
irelandmotorsports.co.uk
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/456-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/456-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3660-24-0x00000000004C0000-0x00000000004E9000-memory.dmp xloader behavioral2/memory/3660-26-0x00000000004C0000-0x00000000004E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1328 set thread context of 456 1328 Quotation 85663455.exe 99 PID 456 set thread context of 3500 456 Quotation 85663455.exe 56 PID 3660 set thread context of 3500 3660 rundll32.exe 56 -
Suspicious behavior: EnumeratesProcesses 36 IoCs
pid Process 456 Quotation 85663455.exe 456 Quotation 85663455.exe 456 Quotation 85663455.exe 456 Quotation 85663455.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe 3660 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 456 Quotation 85663455.exe 456 Quotation 85663455.exe 456 Quotation 85663455.exe 3660 rundll32.exe 3660 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 456 Quotation 85663455.exe Token: SeDebugPrivilege 3660 rundll32.exe Token: SeShutdownPrivilege 3500 Explorer.EXE Token: SeCreatePagefilePrivilege 3500 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1328 wrote to memory of 456 1328 Quotation 85663455.exe 99 PID 1328 wrote to memory of 456 1328 Quotation 85663455.exe 99 PID 1328 wrote to memory of 456 1328 Quotation 85663455.exe 99 PID 1328 wrote to memory of 456 1328 Quotation 85663455.exe 99 PID 1328 wrote to memory of 456 1328 Quotation 85663455.exe 99 PID 1328 wrote to memory of 456 1328 Quotation 85663455.exe 99 PID 3500 wrote to memory of 3660 3500 Explorer.EXE 100 PID 3500 wrote to memory of 3660 3500 Explorer.EXE 100 PID 3500 wrote to memory of 3660 3500 Explorer.EXE 100 PID 3660 wrote to memory of 4180 3660 rundll32.exe 101 PID 3660 wrote to memory of 4180 3660 rundll32.exe 101 PID 3660 wrote to memory of 4180 3660 rundll32.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:456
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation 85663455.exe"3⤵PID:4180
-
-