Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
04-07-2024 01:24
Static task
static1
Behavioral task
behavioral1
Sample
Inquiry 54409880043.exe
Resource
win7-20240419-en
General
-
Target
Inquiry 54409880043.exe
-
Size
789KB
-
MD5
ae7af65b43614259f51d3f713fc89b54
-
SHA1
3fa5ab59e08e5f51c705a7786276af656f95dd65
-
SHA256
22e417c64cdd2caa8cf900dd1a7174d4db4f9c1097489250a7d8a39fc81f47d9
-
SHA512
a9150f369a25857f72758ce6937eefc0d67f990b2c2f1a146e15aa9fb624cbde26b8822953f1dd58a5eb07d6505bc08acfa168438f406fcedadcde38c556d138
-
SSDEEP
12288:BUhGT/f7DSvWN1JuigLYVlaf+dhKeVnVBAzzv6yRJmPv58gipuhpzP+:9zHSvi7AYaf+dk+gzeUrAJ
Malware Config
Extracted
xloader
2.3
gzcj
localzhops.com
cfsb114.com
sweetiefilms.com
cyclewatts.com
bubblesportsevent.com
halloween-r-us.com
rcdzsm.com
reelatioens.com
uniquegranitebenefits.com
chainlinkdex.com
topcoolhlist.com
ivy-apps.com
shopmajesticqueendom.com
ddiesels.com
ventajuguetessexuales.online
daylight93245.com
heiyingxitong.com
personalfashion.guru
usadrugfree.com
beyondcareersuccess.com
materialdomain.com
jqzb888.com
giftflip.net
bmoshiach.com
ceo-studios.com
luohongwei.com
precommgateway.com
btc-360.com
stillalive2021.com
856381033.xyz
ausensports.com
stard.company
tuasistentelod.com
vedrev.digital
phstreetwear.com
madeinarcade.com
bianchitravelagency.com
altadenalife.church
jointo-netflix.com
virginjourney.com
pushyourgrowth.com
bostonm.info
bakedskins.com
seodrift.com
parchedfoodworks.com
cookingwithgrandpa.net
oilandgasemployeesllc.com
carpetcleaningit.com
qualityhomerr.com
dastkhat.info
outlandsolar.com
healthyhappyprosperous.life
cbdheaquarter.com
consunercardaccess.com
dazzlingdivashop.com
ajdbdevelopment.com
biancopantry.com
fundiscoveries.com
erlangonzales.coach
atelier3pen.com
haciendalosarcosmexgrill.com
mjtribebusiness.com
gabotrust.website
8fortherstatka.com
hepnos.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2272-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2272-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2536-25-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2612 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Inquiry 54409880043.exeInquiry 54409880043.exewuapp.exedescription pid Process procid_target PID 1340 set thread context of 2272 1340 Inquiry 54409880043.exe 28 PID 2272 set thread context of 1208 2272 Inquiry 54409880043.exe 21 PID 2536 set thread context of 1208 2536 wuapp.exe 21 -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
Inquiry 54409880043.exeInquiry 54409880043.exewuapp.exepid Process 1340 Inquiry 54409880043.exe 1340 Inquiry 54409880043.exe 2272 Inquiry 54409880043.exe 2272 Inquiry 54409880043.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe 2536 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Inquiry 54409880043.exewuapp.exepid Process 2272 Inquiry 54409880043.exe 2272 Inquiry 54409880043.exe 2272 Inquiry 54409880043.exe 2536 wuapp.exe 2536 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Inquiry 54409880043.exeInquiry 54409880043.exewuapp.exedescription pid Process Token: SeDebugPrivilege 1340 Inquiry 54409880043.exe Token: SeDebugPrivilege 2272 Inquiry 54409880043.exe Token: SeDebugPrivilege 2536 wuapp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
Inquiry 54409880043.exeExplorer.EXEwuapp.exedescription pid Process procid_target PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1340 wrote to memory of 2272 1340 Inquiry 54409880043.exe 28 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 1208 wrote to memory of 2536 1208 Explorer.EXE 30 PID 2536 wrote to memory of 2612 2536 wuapp.exe 31 PID 2536 wrote to memory of 2612 2536 wuapp.exe 31 PID 2536 wrote to memory of 2612 2536 wuapp.exe 31 PID 2536 wrote to memory of 2612 2536 wuapp.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Inquiry 54409880043.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry 54409880043.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Inquiry 54409880043.exe"C:\Users\Admin\AppData\Local\Temp\Inquiry 54409880043.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2272
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:768
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Inquiry 54409880043.exe"3⤵
- Deletes itself
PID:2612
-
-