Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-07-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240704-en
General
-
Target
Quotation.exe
-
Size
864KB
-
MD5
c1a77dddf52f12af022d82471e6bdf19
-
SHA1
c39c5f47d73dd8a0b7fd2ebaad7a7b57a92d0ea0
-
SHA256
5528ee96b8cefda8ec99999701a1673fb0dff17a8e603f2c8ccd3abac08f7489
-
SHA512
b0825bccffaa39791d19919f0ae3f95f384c9da6aad24f50d3623267da266ddde95eb7f0d3777e33cc013a0fe770230a8e03501b7b32d1834528b61af14b60cb
-
SSDEEP
24576:BM94rYW6Z7iYtU+wkx8JwKD84r9kMXW+mj:mnZ7iYtCwi8SHvmj
Malware Config
Extracted
xloader
2.3
uidr
dulichsongcham.com
cash-royal.com
geneseewildlifetrapping.com
9cc9x79m3y2.com
ntjjzx.com
joinglooko.com
upmchealhtrak.com
hookandcask.com
orca-web.com
ag3holdings.com
empoweredinvestmentstx.com
lustywall.com
rcpelaurentides.com
goyalcoorchidnirvanatwo.homes
iotajinn.com
littlemlive.com
hippocratesbio.com
ashleysema.design
175a45.xyz
bpocompaniesphilippines.com
leadmorecommunity.com
mrbobscleaning.com
newdistributorbbc.com
lxhfzy.com
physicianrepresentative.com
integrative-teletherapy.com
selllasheswithla.com
dbxff.com
pinewayorganics.com
bepongbeo.com
dbrulhart.com
thereallynicepeople.com
kakilangit.net
mndesignw.com
send86cells.com
gakkard.com
blacktiers.com
2603083932.xyz
tailoredlacedwigs.com
gaypridebusinessdirectory.com
cowbex.info
lakecharlestreeservices.com
4tza1.com
rimlyane.com
babadoes.com
missteenagerworld.com
womenreadytomove.com
connectingdaybyday.com
paygss.net
cachavachaayd.com
xn--80aaatqunmdeu5n.xn--p1acf
zxr.xyz
baignoire.sucks
analystsguild.com
60ro9e.com
goplaytolearn.com
virtualcarerehab.wiki
fschaogang.com
181215.com
theinlandempirelifestyle.com
laluccasa.com
bflat-store.com
frontrangespiceco.com
carrierocommerical.com
ios.run
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2784-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2784-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2616-22-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2196 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Quotation.exeQuotation.exesvchost.exedescription pid Process procid_target PID 756 set thread context of 2784 756 Quotation.exe 31 PID 2784 set thread context of 1192 2784 Quotation.exe 21 PID 2616 set thread context of 1192 2616 svchost.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Quotation.exesvchost.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 17 IoCs
Processes:
Quotation.exesvchost.exepid Process 2784 Quotation.exe 2784 Quotation.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe 2616 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Quotation.exesvchost.exepid Process 2784 Quotation.exe 2784 Quotation.exe 2784 Quotation.exe 2616 svchost.exe 2616 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Quotation.exesvchost.exedescription pid Process Token: SeDebugPrivilege 2784 Quotation.exe Token: SeDebugPrivilege 2616 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Quotation.exeExplorer.EXEsvchost.exedescription pid Process procid_target PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 756 wrote to memory of 2784 756 Quotation.exe 31 PID 1192 wrote to memory of 2616 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2616 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2616 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2616 1192 Explorer.EXE 32 PID 2616 wrote to memory of 2196 2616 svchost.exe 33 PID 2616 wrote to memory of 2196 2616 svchost.exe 33 PID 2616 wrote to memory of 2196 2616 svchost.exe 33 PID 2616 wrote to memory of 2196 2616 svchost.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2784
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2196
-
-