Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
25-07-2024 01:28
Static task
static1
Behavioral task
behavioral1
Sample
LisectAVT_2403002B_448.exe
Resource
win7-20240705-en
General
-
Target
LisectAVT_2403002B_448.exe
-
Size
743KB
-
MD5
10b55b038f70d21f31cd55f787d44ae0
-
SHA1
8ffb7bd8228f943c54e5137f1894dc6c8b4a54d3
-
SHA256
6a648e78826c4e2e6a4c1f984c91cbedadf14344383306d023f4730d481bce05
-
SHA512
86855a81e92af79055d141f52b73305734763cda1ca4602709e88e819c0e6b6b432bd60b24bde53d07081e2ad20a24dce62e502417be1f6bb665b55f62dea963
-
SSDEEP
12288:zlqyqREeIzk+ZkO+SaTu8psEd7zp5I56IW3B2kb+tqYtkmJ1M:zNeIzJZkO5qsoPva6hEOsqOk0
Malware Config
Extracted
xloader
2.5
hfhf
ddhh9500.com
lesterkwilson.store
southasianrepublicans.com
azumo.xyz
emptycc.net
lelasthriftboutique.com
redis76.com
marinebelaroi.com
hallibrewerproductions.com
elevareassessoria.com
haozhugou.com
anti-ragebot.com
bardo.xyz
dryerventmastersllc.com
qmhdxu.biz
getgoldentoday.com
crippledom.com
primedispatchers.com
052et.xyz
h2adubai.com
coolspanishlikeyou.com
medyncity.store
zahediseresht.com
oliviasnowceramics.com
techis-ichiro.com
shoppingindia.tech
actpress.net
p2psite.net
emplealegal.com
moriwafuu.website
assetmortgagenc.com
newbalancepeak.xyz
xn--ruilnhen-f2a67a660z.com
loveyoumoreboutique.com
vnethotspot.online
theadaptiveadvantage.com
gobestbooks.com
baileys.pet
searchwebnetwork.online
s-thtv.com
nowuckas.top
badkyker.quest
xmqzyz.com
keennook.com
fisocialmedia.com
special-controls.online
xiphiasys.com
gonorthindianbites.com
cqmogj.com
capgeminimerchandise.com
gextop.com
822941.com
azzawisynapses.com
biyell.com
magnauniversity.com
wofmyhome.online
yourchariott.com
escortworks.xyz
balancethekeytoeverything.com
marypetshop.com
universitetrading.com
finessetrades.com
luxalbridi.com
explorebrowser.com
cbrevival.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1544-13-0x000000000AC10000-0x000000000AC39000-memory.dmp xloader behavioral2/memory/4704-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4704-23-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/5008-29-0x0000000000D00000-0x0000000000D29000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1544 set thread context of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 4704 set thread context of 3548 4704 LisectAVT_2403002B_448.exe 56 PID 4704 set thread context of 3548 4704 LisectAVT_2403002B_448.exe 56 PID 5008 set thread context of 3548 5008 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language LisectAVT_2403002B_448.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1705699165-553239100-4129523827-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe 5008 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 4704 LisectAVT_2403002B_448.exe 5008 cmd.exe 5008 cmd.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: SeDebugPrivilege 1544 LisectAVT_2403002B_448.exe Token: SeDebugPrivilege 4704 LisectAVT_2403002B_448.exe Token: SeDebugPrivilege 5008 cmd.exe Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE Token: SeShutdownPrivilege 3548 Explorer.EXE Token: SeCreatePagefilePrivilege 3548 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3548 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1544 wrote to memory of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 1544 wrote to memory of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 1544 wrote to memory of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 1544 wrote to memory of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 1544 wrote to memory of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 1544 wrote to memory of 4704 1544 LisectAVT_2403002B_448.exe 97 PID 3548 wrote to memory of 5008 3548 Explorer.EXE 98 PID 3548 wrote to memory of 5008 3548 Explorer.EXE 98 PID 3548 wrote to memory of 5008 3548 Explorer.EXE 98 PID 5008 wrote to memory of 4076 5008 cmd.exe 99 PID 5008 wrote to memory of 4076 5008 cmd.exe 99 PID 5008 wrote to memory of 4076 5008 cmd.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3548 -
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4704
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\LisectAVT_2403002B_448.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4076
-
-