Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240705-en
General
-
Target
Quotation.exe
-
Size
478KB
-
MD5
085f6796a761a1f1dd252ef348f2fe69
-
SHA1
9abd15c6bc542b0bd8baa79f90540dd7f1f80af1
-
SHA256
b0787f51caf44390126cfb1e827d548139021e30bca2cf2e299917ea5788a8bf
-
SHA512
80ca49f471e3b53890869e4be0cfae82ce12367ce20b5436a5daa8c886f7e14f11b2de402ae714f53ac362b730a1fb104d981e99ab186b795e24ae8da4d2131f
-
SSDEEP
12288:Xd9ozJLSibqU65lOAVQsuCwBivjcK95u1t09b:LozlSDUiVQsVaIF
Malware Config
Extracted
xloader
2.3
uidr
dulichsongcham.com
cash-royal.com
geneseewildlifetrapping.com
9cc9x79m3y2.com
ntjjzx.com
joinglooko.com
upmchealhtrak.com
hookandcask.com
orca-web.com
ag3holdings.com
empoweredinvestmentstx.com
lustywall.com
rcpelaurentides.com
goyalcoorchidnirvanatwo.homes
iotajinn.com
littlemlive.com
hippocratesbio.com
ashleysema.design
175a45.xyz
bpocompaniesphilippines.com
leadmorecommunity.com
mrbobscleaning.com
newdistributorbbc.com
lxhfzy.com
physicianrepresentative.com
integrative-teletherapy.com
selllasheswithla.com
dbxff.com
pinewayorganics.com
bepongbeo.com
dbrulhart.com
thereallynicepeople.com
kakilangit.net
mndesignw.com
send86cells.com
gakkard.com
blacktiers.com
2603083932.xyz
tailoredlacedwigs.com
gaypridebusinessdirectory.com
cowbex.info
lakecharlestreeservices.com
4tza1.com
rimlyane.com
babadoes.com
missteenagerworld.com
womenreadytomove.com
connectingdaybyday.com
paygss.net
cachavachaayd.com
xn--80aaatqunmdeu5n.xn--p1acf
zxr.xyz
baignoire.sucks
analystsguild.com
60ro9e.com
goplaytolearn.com
virtualcarerehab.wiki
fschaogang.com
181215.com
theinlandempirelifestyle.com
laluccasa.com
bflat-store.com
frontrangespiceco.com
carrierocommerical.com
ios.run
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2364-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2364-15-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2664-21-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2580 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2404 set thread context of 2364 2404 Quotation.exe 33 PID 2364 set thread context of 1388 2364 Quotation.exe 21 PID 2664 set thread context of 1388 2664 netsh.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2404 Quotation.exe 2404 Quotation.exe 2364 Quotation.exe 2364 Quotation.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe 2664 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2364 Quotation.exe 2364 Quotation.exe 2364 Quotation.exe 2664 netsh.exe 2664 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2404 Quotation.exe Token: SeDebugPrivilege 2364 Quotation.exe Token: SeDebugPrivilege 2664 netsh.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2892 2404 Quotation.exe 31 PID 2404 wrote to memory of 2892 2404 Quotation.exe 31 PID 2404 wrote to memory of 2892 2404 Quotation.exe 31 PID 2404 wrote to memory of 2892 2404 Quotation.exe 31 PID 2404 wrote to memory of 2616 2404 Quotation.exe 32 PID 2404 wrote to memory of 2616 2404 Quotation.exe 32 PID 2404 wrote to memory of 2616 2404 Quotation.exe 32 PID 2404 wrote to memory of 2616 2404 Quotation.exe 32 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 2404 wrote to memory of 2364 2404 Quotation.exe 33 PID 1388 wrote to memory of 2664 1388 Explorer.EXE 34 PID 1388 wrote to memory of 2664 1388 Explorer.EXE 34 PID 1388 wrote to memory of 2664 1388 Explorer.EXE 34 PID 1388 wrote to memory of 2664 1388 Explorer.EXE 34 PID 2664 wrote to memory of 2580 2664 netsh.exe 35 PID 2664 wrote to memory of 2580 2664 netsh.exe 35 PID 2664 wrote to memory of 2580 2664 netsh.exe 35 PID 2664 wrote to memory of 2580 2664 netsh.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2364
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2580
-
-