Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
12-07-2024 08:00
Static task
static1
Behavioral task
behavioral1
Sample
PO-090221.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
PO-090221.exe
Resource
win10v2004-20240709-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240704-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240709-en
Behavioral task
behavioral5
Sample
yrcvb.dll
Resource
win7-20240705-en
Behavioral task
behavioral6
Sample
yrcvb.dll
Resource
win10v2004-20240709-en
General
-
Target
PO-090221.exe
-
Size
221KB
-
MD5
ca11f896143acf2168b383b5532ef812
-
SHA1
fe4cf4a32e0633b9e47869a0850369c7854ec6d7
-
SHA256
1fa8e3489567519f9ed48d1323d7316118bfd2f5f6434a942202e4ccc64f8fbf
-
SHA512
c2d103eefae3afc47eec34210b3aa90283c13f9819c328334474caee8e0ea68dd17e6daa623fdb22af824c14083f53acdb37af84d189820b0406d52bfec41ee4
-
SSDEEP
3072:oBkfJpRXATwMdFCcmbA94/P32S+INSyftupOxoit6HC77zaDrxehjkEXdN9Nt:oqjIeA94HDN8pOOM6HCmDQkIPnt
Malware Config
Extracted
xloader
2.3
gzcj
localzhops.com
cfsb114.com
sweetiefilms.com
cyclewatts.com
bubblesportsevent.com
halloween-r-us.com
rcdzsm.com
reelatioens.com
uniquegranitebenefits.com
chainlinkdex.com
topcoolhlist.com
ivy-apps.com
shopmajesticqueendom.com
ddiesels.com
ventajuguetessexuales.online
daylight93245.com
heiyingxitong.com
personalfashion.guru
usadrugfree.com
beyondcareersuccess.com
materialdomain.com
jqzb888.com
giftflip.net
bmoshiach.com
ceo-studios.com
luohongwei.com
precommgateway.com
btc-360.com
stillalive2021.com
856381033.xyz
ausensports.com
stard.company
tuasistentelod.com
vedrev.digital
phstreetwear.com
madeinarcade.com
bianchitravelagency.com
altadenalife.church
jointo-netflix.com
virginjourney.com
pushyourgrowth.com
bostonm.info
bakedskins.com
seodrift.com
parchedfoodworks.com
cookingwithgrandpa.net
oilandgasemployeesllc.com
carpetcleaningit.com
qualityhomerr.com
dastkhat.info
outlandsolar.com
healthyhappyprosperous.life
cbdheaquarter.com
consunercardaccess.com
dazzlingdivashop.com
ajdbdevelopment.com
biancopantry.com
fundiscoveries.com
erlangonzales.coach
atelier3pen.com
haciendalosarcosmexgrill.com
mjtribebusiness.com
gabotrust.website
8fortherstatka.com
hepnos.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1996-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1996-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2352-23-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2788 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 3040 PO-090221.exe 3040 PO-090221.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3040 set thread context of 1996 3040 PO-090221.exe 30 PID 1996 set thread context of 1244 1996 PO-090221.exe 21 PID 2352 set thread context of 1244 2352 wlanext.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 3040 PO-090221.exe 3040 PO-090221.exe 3040 PO-090221.exe 3040 PO-090221.exe 1996 PO-090221.exe 1996 PO-090221.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe 2352 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3040 PO-090221.exe 1996 PO-090221.exe 1996 PO-090221.exe 1996 PO-090221.exe 2352 wlanext.exe 2352 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1996 PO-090221.exe Token: SeDebugPrivilege 2352 wlanext.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3040 wrote to memory of 1996 3040 PO-090221.exe 30 PID 3040 wrote to memory of 1996 3040 PO-090221.exe 30 PID 3040 wrote to memory of 1996 3040 PO-090221.exe 30 PID 3040 wrote to memory of 1996 3040 PO-090221.exe 30 PID 3040 wrote to memory of 1996 3040 PO-090221.exe 30 PID 1244 wrote to memory of 2352 1244 Explorer.EXE 31 PID 1244 wrote to memory of 2352 1244 Explorer.EXE 31 PID 1244 wrote to memory of 2352 1244 Explorer.EXE 31 PID 1244 wrote to memory of 2352 1244 Explorer.EXE 31 PID 2352 wrote to memory of 2788 2352 wlanext.exe 32 PID 2352 wrote to memory of 2788 2352 wlanext.exe 32 PID 2352 wrote to memory of 2788 2352 wlanext.exe 32 PID 2352 wrote to memory of 2788 2352 wlanext.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\PO-090221.exe"C:\Users\Admin\AppData\Local\Temp\PO-090221.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\PO-090221.exe"C:\Users\Admin\AppData\Local\Temp\PO-090221.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1996
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO-090221.exe"3⤵
- Deletes itself
PID:2788
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
Filesize
11KB
MD5ce58ee918da61b9ad6d17ea883108b75
SHA1ba22489f71b94f0593bb02a89668aa293ce4ca8b
SHA2561175fe7473ab4675f5197a3a5271c095f2a0ad01ee5e55a728c0f208adaeef01
SHA512fa452aeffcb848f4e62a7f3df2ae10dfdc75bb49e3b80e8af076056ea648b438a98a625d951c4b769cc2ffa85742d150aa45290749779dbdc7005bbacdd0ef7a