Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-05-2024 06:54
Static task
static1
Behavioral task
behavioral1
Sample
Drawings & Related Specifications.exe
Resource
win7-20240221-en
General
-
Target
Drawings & Related Specifications.exe
-
Size
500KB
-
MD5
eb5dd6ea7ec8c4897c3031824637414c
-
SHA1
d0064d5dff2613aa21a8229492c2c3149ba7ec1d
-
SHA256
370293d95666a952ba140489c797e3c7d82a92cb400e360f7743075aee04ca10
-
SHA512
3dfadce944c234dc356961739f528b1a9516a0266d295c90577c506ed73a8693253eabb8f7e231e0f126dfc38039b18c7ddd4ca0c964245c751e54d58615ff00
-
SSDEEP
12288:vuQ16pHy86FQNTPmjE79nW31TMgTCimkrDqs9gWmKXsD2XN4:116pHy2NTP99W3Sg2ilT9ynu4
Malware Config
Extracted
xloader
2.1
cvd
wanda-dutyfree.net
m399999.com
adultoutopico.com
acappellawebradio.com
geetaisprings.com
californiacredit.repair
view-merchant.review
autoritecenter.com
lke7992.com
carroceriasalchichica.com
shanhaishidai.com
wuyounice.com
ahyingshi.com
eurocrypt.net
zvxhs.info
nxsexyvip.com
suffolkbuildingcontrol.com
sotruemobiledetailing.com
bizsolmx.com
personalidea.net
c-aesthetics.com
quanguixs.com
szhgprt.com
conferenceinmelbourne2017.com
smilevillage.win
woyaodani.com
woltbikes.com
tbmbgb.tech
truelovethatlasts.com
vidsummitlive.com
southalabamahomeschooling.com
chakrabalancetherapy.com
cross-bag.com
livest1ontheplains.com
gaemari.com
werebeancoffee.com
membershipmarketing.info
pakistaniinstitute.com
submarr.com
rideordie2k19.com
ramelgayrimenkul.com
web-start.info
playawesomeslots.com
appletreefarm.info
mightyheartspreschool.com
onoraodalis.net
settesecondicirca.com
clmsys.biz
fahabok.com
warwickfoodconsultants.com
cheaptolisbon.com
hcbusinessmedia.com
erwonventures.com
rmdequipos.com
mooreandmoorecrafts.com
davidrogersphotos.com
verlors.com
djdkkp.info
graphicdesignerlakewood.com
minutefountain.info
nirvanawebsolutions.com
fifarcade.com
thepodhome.com
mrsscottmlyes.com
magento-tracks.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2444-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2444-15-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2200-21-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2704 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Drawings & Related Specifications.exeDrawings & Related Specifications.exewlanext.exedescription pid Process procid_target PID 1756 set thread context of 2444 1756 Drawings & Related Specifications.exe 31 PID 2444 set thread context of 1212 2444 Drawings & Related Specifications.exe 21 PID 2200 set thread context of 1212 2200 wlanext.exe 21 -
Suspicious behavior: EnumeratesProcesses 22 IoCs
Processes:
Drawings & Related Specifications.exeDrawings & Related Specifications.exewlanext.exepid Process 1756 Drawings & Related Specifications.exe 1756 Drawings & Related Specifications.exe 2444 Drawings & Related Specifications.exe 2444 Drawings & Related Specifications.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe 2200 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Drawings & Related Specifications.exewlanext.exepid Process 2444 Drawings & Related Specifications.exe 2444 Drawings & Related Specifications.exe 2444 Drawings & Related Specifications.exe 2200 wlanext.exe 2200 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Drawings & Related Specifications.exeDrawings & Related Specifications.exewlanext.exedescription pid Process Token: SeDebugPrivilege 1756 Drawings & Related Specifications.exe Token: SeDebugPrivilege 2444 Drawings & Related Specifications.exe Token: SeDebugPrivilege 2200 wlanext.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Drawings & Related Specifications.exeExplorer.EXEwlanext.exedescription pid Process procid_target PID 1756 wrote to memory of 2504 1756 Drawings & Related Specifications.exe 30 PID 1756 wrote to memory of 2504 1756 Drawings & Related Specifications.exe 30 PID 1756 wrote to memory of 2504 1756 Drawings & Related Specifications.exe 30 PID 1756 wrote to memory of 2504 1756 Drawings & Related Specifications.exe 30 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1756 wrote to memory of 2444 1756 Drawings & Related Specifications.exe 31 PID 1212 wrote to memory of 2200 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2200 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2200 1212 Explorer.EXE 32 PID 1212 wrote to memory of 2200 1212 Explorer.EXE 32 PID 2200 wrote to memory of 2704 2200 wlanext.exe 33 PID 2200 wrote to memory of 2704 2200 wlanext.exe 33 PID 2200 wrote to memory of 2704 2200 wlanext.exe 33 PID 2200 wrote to memory of 2704 2200 wlanext.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"3⤵PID:2504
-
-
C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Drawings & Related Specifications.exe"3⤵
- Deletes itself
PID:2704
-
-