Analysis
-
max time kernel
147s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 01:41
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240705-en
General
-
Target
Quotation.exe
-
Size
478KB
-
MD5
085f6796a761a1f1dd252ef348f2fe69
-
SHA1
9abd15c6bc542b0bd8baa79f90540dd7f1f80af1
-
SHA256
b0787f51caf44390126cfb1e827d548139021e30bca2cf2e299917ea5788a8bf
-
SHA512
80ca49f471e3b53890869e4be0cfae82ce12367ce20b5436a5daa8c886f7e14f11b2de402ae714f53ac362b730a1fb104d981e99ab186b795e24ae8da4d2131f
-
SSDEEP
12288:Xd9ozJLSibqU65lOAVQsuCwBivjcK95u1t09b:LozlSDUiVQsVaIF
Malware Config
Extracted
xloader
2.3
uidr
dulichsongcham.com
cash-royal.com
geneseewildlifetrapping.com
9cc9x79m3y2.com
ntjjzx.com
joinglooko.com
upmchealhtrak.com
hookandcask.com
orca-web.com
ag3holdings.com
empoweredinvestmentstx.com
lustywall.com
rcpelaurentides.com
goyalcoorchidnirvanatwo.homes
iotajinn.com
littlemlive.com
hippocratesbio.com
ashleysema.design
175a45.xyz
bpocompaniesphilippines.com
leadmorecommunity.com
mrbobscleaning.com
newdistributorbbc.com
lxhfzy.com
physicianrepresentative.com
integrative-teletherapy.com
selllasheswithla.com
dbxff.com
pinewayorganics.com
bepongbeo.com
dbrulhart.com
thereallynicepeople.com
kakilangit.net
mndesignw.com
send86cells.com
gakkard.com
blacktiers.com
2603083932.xyz
tailoredlacedwigs.com
gaypridebusinessdirectory.com
cowbex.info
lakecharlestreeservices.com
4tza1.com
rimlyane.com
babadoes.com
missteenagerworld.com
womenreadytomove.com
connectingdaybyday.com
paygss.net
cachavachaayd.com
xn--80aaatqunmdeu5n.xn--p1acf
zxr.xyz
baignoire.sucks
analystsguild.com
60ro9e.com
goplaytolearn.com
virtualcarerehab.wiki
fschaogang.com
181215.com
theinlandempirelifestyle.com
laluccasa.com
bflat-store.com
frontrangespiceco.com
carrierocommerical.com
ios.run
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1848-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1848-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3024-22-0x0000000000B30000-0x0000000000B58000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3836 set thread context of 1848 3836 Quotation.exe 98 PID 1848 set thread context of 3468 1848 Quotation.exe 56 PID 3024 set thread context of 3468 3024 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3024 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 1848 Quotation.exe 1848 Quotation.exe 1848 Quotation.exe 1848 Quotation.exe 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE 3024 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1848 Quotation.exe 1848 Quotation.exe 1848 Quotation.exe 3024 NETSTAT.EXE 3024 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1848 Quotation.exe Token: SeDebugPrivilege 3024 NETSTAT.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3468 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3836 wrote to memory of 1848 3836 Quotation.exe 98 PID 3836 wrote to memory of 1848 3836 Quotation.exe 98 PID 3836 wrote to memory of 1848 3836 Quotation.exe 98 PID 3836 wrote to memory of 1848 3836 Quotation.exe 98 PID 3836 wrote to memory of 1848 3836 Quotation.exe 98 PID 3836 wrote to memory of 1848 3836 Quotation.exe 98 PID 3468 wrote to memory of 3024 3468 Explorer.EXE 99 PID 3468 wrote to memory of 3024 3468 Explorer.EXE 99 PID 3468 wrote to memory of 3024 3468 Explorer.EXE 99 PID 3024 wrote to memory of 3932 3024 NETSTAT.EXE 100 PID 3024 wrote to memory of 3932 3024 NETSTAT.EXE 100 PID 3024 wrote to memory of 3932 3024 NETSTAT.EXE 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3836 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1848
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3932
-
-