Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
20-04-2024 04:54
Static task
static1
Behavioral task
behavioral1
Sample
PaymentAdvice.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
PaymentAdvice.exe
Resource
win10v2004-20240412-en
General
-
Target
PaymentAdvice.exe
-
Size
250KB
-
MD5
6a9209198711b88b06ed9834692ca1c8
-
SHA1
1f25855e8d81f9898689edbfbc0458a862d29663
-
SHA256
33d3af05d1fcf28764c48629687647f8a765d4dfccee946a470356366f521387
-
SHA512
35142e44c94cd2fceb726ed0ebf5065878bf0a085d3092a6f8e7302033cb885da163a1d8fc61d23f23280257a3f2aacd67add75d0cd949cc55157cbdde169d99
-
SSDEEP
3072:svecvGokz8uuewZe4qhkALYf+M2cOaiT62nSxZv1xFddEnkwoJIlePAm1AdV:svNKz8ZFZP6k+htxtSfrw6IRiAX
Malware Config
Extracted
xloader
2.3
pagi
makehrworkable.com
sound-wisdom.com
blacts.com
caenantglamping.com
meridiancpas.com
draughtedinn.co.uk
windywoodshc.com
mintmovileplus.com
pubgeventdailylogin.com
thesocialdzr.com
holapv.com
racevc.com
openpula.pro
wepreventstroke.com
autoclosy.com
enginkarabacak.com
15096eec1652.info
buildthefoundation.net
pwilliamberciklaw.com
paramountrevenueadvisors.com
omaetomoko.com
hastingsranchphysgrp.com
dakotarealestategroup.com
domentemenegi39.net
sightuiop.com
automobiliatint.com
mensfashiontody.com
jonmyquizz.com
avaknew.info
coloradoriverfoodbank.com
thechiemgauers.com
bungalowbankers.com
askmelaptop.com
sadlercc.net
igengchuang.com
maisondesjeunesamos.com
fortehomesrl.com
shmysd.com
topitemsworldwide.xyz
mandyabelljustbelieves.com
sistams.com
sdapkute.com
tickermine.com
thelettermuse.com
jcuiovpoizelrkjlkwcpopoisq.info
bitmaticperu.com
permalinkbusiness.com
axing8898.xyz
fwbzjx.com
pandemicleaders.com
rusmumrik.com
ggfbank.com
lilinvestor.com
rewawealth.com
eugenerentallisting.com
xtremboat.com
apelidos.net
erlebnistage-tomcat.com
critfix.com
canadianhempsociety.com
showqiang.com
arisbasics.com
t1978.com
kocnetelgroup.com
hornti.com
Signatures
-
Xloader payload 5 IoCs
resource yara_rule behavioral1/memory/1744-2-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1744-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1744-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2568-18-0x00000000000D0000-0x00000000000F8000-memory.dmp xloader behavioral1/memory/2568-20-0x00000000000D0000-0x00000000000F8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3008 set thread context of 1744 3008 PaymentAdvice.exe 28 PID 1744 set thread context of 1368 1744 PaymentAdvice.exe 21 PID 1744 set thread context of 1368 1744 PaymentAdvice.exe 21 PID 2568 set thread context of 1368 2568 help.exe 21 -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1744 PaymentAdvice.exe 1744 PaymentAdvice.exe 1744 PaymentAdvice.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe 2568 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3008 PaymentAdvice.exe 1744 PaymentAdvice.exe 1744 PaymentAdvice.exe 1744 PaymentAdvice.exe 1744 PaymentAdvice.exe 2568 help.exe 2568 help.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1744 PaymentAdvice.exe Token: SeDebugPrivilege 2568 help.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3008 wrote to memory of 1744 3008 PaymentAdvice.exe 28 PID 3008 wrote to memory of 1744 3008 PaymentAdvice.exe 28 PID 3008 wrote to memory of 1744 3008 PaymentAdvice.exe 28 PID 3008 wrote to memory of 1744 3008 PaymentAdvice.exe 28 PID 3008 wrote to memory of 1744 3008 PaymentAdvice.exe 28 PID 1744 wrote to memory of 2568 1744 PaymentAdvice.exe 30 PID 1744 wrote to memory of 2568 1744 PaymentAdvice.exe 30 PID 1744 wrote to memory of 2568 1744 PaymentAdvice.exe 30 PID 1744 wrote to memory of 2568 1744 PaymentAdvice.exe 30 PID 2568 wrote to memory of 2652 2568 help.exe 31 PID 2568 wrote to memory of 2652 2568 help.exe 31 PID 2568 wrote to memory of 2652 2568 help.exe 31 PID 2568 wrote to memory of 2652 2568 help.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1368
-
C:\Users\Admin\AppData\Local\Temp\PaymentAdvice.exe"C:\Users\Admin\AppData\Local\Temp\PaymentAdvice.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\PaymentAdvice.exe"C:\Users\Admin\AppData\Local\Temp\PaymentAdvice.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"4⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PaymentAdvice.exe"5⤵
- Deletes itself
PID:2652
-
-
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2664
-