Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice MT103_PDF.exe
Resource
win7-20240221-en
General
-
Target
Payment_Advice MT103_PDF.exe
-
Size
1.3MB
-
MD5
73697bb26242562cc3b9fde3de369fcb
-
SHA1
7551d770c6358c3ec5483e12882a42eacc12e854
-
SHA256
6b63415f87f97a86a998a5b78bb16953a25b6a045df9a8593432169ec65bcaaf
-
SHA512
f1838d11737b8501b73c4afbe0d5b3fc3bf4ada6dd894985edaf707fc358a9ba24a291407eb1fa15a95a178df886469536e3a3994486d9c9966814851099b2ee
-
SSDEEP
24576:wmpZ76DOqfx8Dgyfx8DgM1dUEOePbzE+XsdainTlQwDZD2L:jZ76v58Dgy58DgM1dMeDzgaiHZK
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2444-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2444-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1232-22-0x0000000000100000-0x0000000000128000-memory.dmp xloader behavioral1/memory/1232-24-0x0000000000100000-0x0000000000128000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1624 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1808 set thread context of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 2444 set thread context of 1212 2444 Payment_Advice MT103_PDF.exe 21 PID 1232 set thread context of 1212 1232 cmmon32.exe 21 -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2444 Payment_Advice MT103_PDF.exe 2444 Payment_Advice MT103_PDF.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2444 Payment_Advice MT103_PDF.exe 2444 Payment_Advice MT103_PDF.exe 2444 Payment_Advice MT103_PDF.exe 1232 cmmon32.exe 1232 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2444 Payment_Advice MT103_PDF.exe Token: SeDebugPrivilege 1232 cmmon32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe 30 PID 1212 wrote to memory of 1232 1212 Explorer.EXE 31 PID 1212 wrote to memory of 1232 1212 Explorer.EXE 31 PID 1212 wrote to memory of 1232 1212 Explorer.EXE 31 PID 1212 wrote to memory of 1232 1212 Explorer.EXE 31 PID 1232 wrote to memory of 1624 1232 cmmon32.exe 32 PID 1232 wrote to memory of 1624 1232 cmmon32.exe 32 PID 1232 wrote to memory of 1624 1232 cmmon32.exe 32 PID 1232 wrote to memory of 1624 1232 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"3⤵
- Deletes itself
PID:1624
-
-