Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26-07-2024 01:56
Static task
static1
Behavioral task
behavioral1
Sample
Quotation.exe
Resource
win7-20240704-en
General
-
Target
Quotation.exe
-
Size
864KB
-
MD5
c1a77dddf52f12af022d82471e6bdf19
-
SHA1
c39c5f47d73dd8a0b7fd2ebaad7a7b57a92d0ea0
-
SHA256
5528ee96b8cefda8ec99999701a1673fb0dff17a8e603f2c8ccd3abac08f7489
-
SHA512
b0825bccffaa39791d19919f0ae3f95f384c9da6aad24f50d3623267da266ddde95eb7f0d3777e33cc013a0fe770230a8e03501b7b32d1834528b61af14b60cb
-
SSDEEP
24576:BM94rYW6Z7iYtU+wkx8JwKD84r9kMXW+mj:mnZ7iYtCwi8SHvmj
Malware Config
Extracted
xloader
2.3
uidr
dulichsongcham.com
cash-royal.com
geneseewildlifetrapping.com
9cc9x79m3y2.com
ntjjzx.com
joinglooko.com
upmchealhtrak.com
hookandcask.com
orca-web.com
ag3holdings.com
empoweredinvestmentstx.com
lustywall.com
rcpelaurentides.com
goyalcoorchidnirvanatwo.homes
iotajinn.com
littlemlive.com
hippocratesbio.com
ashleysema.design
175a45.xyz
bpocompaniesphilippines.com
leadmorecommunity.com
mrbobscleaning.com
newdistributorbbc.com
lxhfzy.com
physicianrepresentative.com
integrative-teletherapy.com
selllasheswithla.com
dbxff.com
pinewayorganics.com
bepongbeo.com
dbrulhart.com
thereallynicepeople.com
kakilangit.net
mndesignw.com
send86cells.com
gakkard.com
blacktiers.com
2603083932.xyz
tailoredlacedwigs.com
gaypridebusinessdirectory.com
cowbex.info
lakecharlestreeservices.com
4tza1.com
rimlyane.com
babadoes.com
missteenagerworld.com
womenreadytomove.com
connectingdaybyday.com
paygss.net
cachavachaayd.com
xn--80aaatqunmdeu5n.xn--p1acf
zxr.xyz
baignoire.sucks
analystsguild.com
60ro9e.com
goplaytolearn.com
virtualcarerehab.wiki
fschaogang.com
181215.com
theinlandempirelifestyle.com
laluccasa.com
bflat-store.com
frontrangespiceco.com
carrierocommerical.com
ios.run
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1528-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1528-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2500-22-0x00000000005D0000-0x00000000005F8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Quotation.exeQuotation.exemsdt.exedescription pid Process procid_target PID 2300 set thread context of 1528 2300 Quotation.exe 98 PID 1528 set thread context of 3604 1528 Quotation.exe 56 PID 2500 set thread context of 3604 2500 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Quotation.exemsdt.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
Processes:
Explorer.EXEdescription ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-1176886754-713327781-2233697964-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 34 IoCs
Processes:
Quotation.exemsdt.exepid Process 1528 Quotation.exe 1528 Quotation.exe 1528 Quotation.exe 1528 Quotation.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe 2500 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Quotation.exemsdt.exepid Process 1528 Quotation.exe 1528 Quotation.exe 1528 Quotation.exe 2500 msdt.exe 2500 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Quotation.exemsdt.exedescription pid Process Token: SeDebugPrivilege 1528 Quotation.exe Token: SeDebugPrivilege 2500 msdt.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid Process 3604 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Quotation.exeExplorer.EXEmsdt.exedescription pid Process procid_target PID 2300 wrote to memory of 1528 2300 Quotation.exe 98 PID 2300 wrote to memory of 1528 2300 Quotation.exe 98 PID 2300 wrote to memory of 1528 2300 Quotation.exe 98 PID 2300 wrote to memory of 1528 2300 Quotation.exe 98 PID 2300 wrote to memory of 1528 2300 Quotation.exe 98 PID 2300 wrote to memory of 1528 2300 Quotation.exe 98 PID 3604 wrote to memory of 2500 3604 Explorer.EXE 99 PID 3604 wrote to memory of 2500 3604 Explorer.EXE 99 PID 3604 wrote to memory of 2500 3604 Explorer.EXE 99 PID 2500 wrote to memory of 4936 2500 msdt.exe 100 PID 2500 wrote to memory of 4936 2500 msdt.exe 100 PID 2500 wrote to memory of 4936 2500 msdt.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1528
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4936
-
-