Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
25-07-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
LisectAVT_2403002B_448.exe
Resource
win7-20240705-en
General
-
Target
LisectAVT_2403002B_448.exe
-
Size
743KB
-
MD5
10b55b038f70d21f31cd55f787d44ae0
-
SHA1
8ffb7bd8228f943c54e5137f1894dc6c8b4a54d3
-
SHA256
6a648e78826c4e2e6a4c1f984c91cbedadf14344383306d023f4730d481bce05
-
SHA512
86855a81e92af79055d141f52b73305734763cda1ca4602709e88e819c0e6b6b432bd60b24bde53d07081e2ad20a24dce62e502417be1f6bb665b55f62dea963
-
SSDEEP
12288:zlqyqREeIzk+ZkO+SaTu8psEd7zp5I56IW3B2kb+tqYtkmJ1M:zNeIzJZkO5qsoPva6hEOsqOk0
Malware Config
Extracted
xloader
2.5
hfhf
ddhh9500.com
lesterkwilson.store
southasianrepublicans.com
azumo.xyz
emptycc.net
lelasthriftboutique.com
redis76.com
marinebelaroi.com
hallibrewerproductions.com
elevareassessoria.com
haozhugou.com
anti-ragebot.com
bardo.xyz
dryerventmastersllc.com
qmhdxu.biz
getgoldentoday.com
crippledom.com
primedispatchers.com
052et.xyz
h2adubai.com
coolspanishlikeyou.com
medyncity.store
zahediseresht.com
oliviasnowceramics.com
techis-ichiro.com
shoppingindia.tech
actpress.net
p2psite.net
emplealegal.com
moriwafuu.website
assetmortgagenc.com
newbalancepeak.xyz
xn--ruilnhen-f2a67a660z.com
loveyoumoreboutique.com
vnethotspot.online
theadaptiveadvantage.com
gobestbooks.com
baileys.pet
searchwebnetwork.online
s-thtv.com
nowuckas.top
badkyker.quest
xmqzyz.com
keennook.com
fisocialmedia.com
special-controls.online
xiphiasys.com
gonorthindianbites.com
cqmogj.com
capgeminimerchandise.com
gextop.com
822941.com
azzawisynapses.com
biyell.com
magnauniversity.com
wofmyhome.online
yourchariott.com
escortworks.xyz
balancethekeytoeverything.com
marypetshop.com
universitetrading.com
finessetrades.com
luxalbridi.com
explorebrowser.com
cbrevival.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2496-8-0x00000000041F0000-0x0000000004219000-memory.dmp xloader behavioral1/memory/2744-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2584-25-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2720 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2496 set thread context of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2744 set thread context of 1200 2744 LisectAVT_2403002B_448.exe 21 PID 2584 set thread context of 1200 2584 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002B_448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 2496 LisectAVT_2403002B_448.exe 2496 LisectAVT_2403002B_448.exe 2744 LisectAVT_2403002B_448.exe 2744 LisectAVT_2403002B_448.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe 2584 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2744 LisectAVT_2403002B_448.exe 2744 LisectAVT_2403002B_448.exe 2744 LisectAVT_2403002B_448.exe 2584 control.exe 2584 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2496 LisectAVT_2403002B_448.exe Token: SeDebugPrivilege 2744 LisectAVT_2403002B_448.exe Token: SeDebugPrivilege 2584 control.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2496 wrote to memory of 2800 2496 LisectAVT_2403002B_448.exe 31 PID 2496 wrote to memory of 2800 2496 LisectAVT_2403002B_448.exe 31 PID 2496 wrote to memory of 2800 2496 LisectAVT_2403002B_448.exe 31 PID 2496 wrote to memory of 2800 2496 LisectAVT_2403002B_448.exe 31 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 2496 wrote to memory of 2744 2496 LisectAVT_2403002B_448.exe 32 PID 1200 wrote to memory of 2584 1200 Explorer.EXE 33 PID 1200 wrote to memory of 2584 1200 Explorer.EXE 33 PID 1200 wrote to memory of 2584 1200 Explorer.EXE 33 PID 1200 wrote to memory of 2584 1200 Explorer.EXE 33 PID 2584 wrote to memory of 2720 2584 control.exe 34 PID 2584 wrote to memory of 2720 2584 control.exe 34 PID 2584 wrote to memory of 2720 2584 control.exe 34 PID 2584 wrote to memory of 2720 2584 control.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"3⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2744
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2720
-
-