Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11-08-2024 09:01
Static task
static1
Behavioral task
behavioral1
Sample
P.O-48452689535945.exe
Resource
win7-20240704-en
General
-
Target
P.O-48452689535945.exe
-
Size
521KB
-
MD5
579c372392d600a9ef621ae4c1f7341a
-
SHA1
e4fb160d99727aa5ffee784c9a5f52f6581704ee
-
SHA256
f564f410274ccf48d4513984d1da95edefa874a555f5e7d95fae7f9cc1f46b6b
-
SHA512
1c744f5d9b4bb04e0ed84bc66ad6a4970e2ff18da28a4c2b9910683821c6fe43ad585e22c56fbb26e1c0db547c7e58d432ffb9c1186da81b47c7f13e7335755f
-
SSDEEP
6144:0uq2lrmbYS9j7tCiyEKAm63z9EZgVY+RQbwesfqFi/mpZ5bjf9VAZUUryjzbi:0WCbYQjoiuM3J0CyFzxVAZnreXi
Malware Config
Extracted
xloader
2.3
h3qo
dhflow.com
jyindex.com
ezcleanhandle.com
trungtamcongdong.online
simsprotectionagency.com
easylivemeet.com
blackvikingfashionhouse.com
52banxue.com
girlsinit.com
drhemo.com
freethefarmers.com
velvetrosephotography.com
geometricbotaniclas.com
skyandspirit.com
deltacomunicacao.com
mucademy.com
jaboilfieldsolutions.net
howtowinatblackjacknow.com
anytimegrowth.com
simranluthra.com
thefinleyshow.com
basalmeals.com
esurpluss.com
hrbjczsfs.com
tourphuquocnguyenhien.com
mxprographics.com
themetaphysicalmaster.net
directorystar.asia
thehomeofdiamonds.com
riqinxin.com
covicio.com
sciineurope.com
womensportclothes.com
celestialchimes.net
lotsmen.com
hi-rescloud.net
lewisnathaniel.com
ageonward.com
eyetownglasses.com
bingent.info
matildealvaradovera.com
otorrinonews.com
cdeg898.com
lexingtoncoorgresort.com
minidachshundpups.com
tools365-shop.com
romancingtheeras.com
residentmining.com
aquaflowsprinklers.com
crackapks.com
caffeinatedeverafter.com
sureyyapasa.net
strawberryhearts.com
ptgo.net
devyshkam.com
thethrottletherapy.com
givelyrics.com
signaturepsinc.com
mersinsudunyasi.com
fivedayskitchen.com
fefebeauty.com
long0001.com
hmm40.com
claracarbon.com
elevatedenterprizes.com
Signatures
-
Beds Protector Packer 1 IoCs
Detects Beds Protector packer used to load .NET malware.
resource yara_rule behavioral2/memory/3364-4-0x0000000004FD0000-0x000000000502E000-memory.dmp beds_protector -
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/228-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/228-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/228-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1040-22-0x0000000000760000-0x0000000000789000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3364 set thread context of 228 3364 P.O-48452689535945.exe 85 PID 228 set thread context of 3524 228 P.O-48452689535945.exe 56 PID 228 set thread context of 3524 228 P.O-48452689535945.exe 56 PID 1040 set thread context of 3524 1040 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language P.O-48452689535945.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe 1040 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 228 P.O-48452689535945.exe 1040 chkdsk.exe 1040 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 228 P.O-48452689535945.exe Token: SeDebugPrivilege 1040 chkdsk.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3524 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3364 wrote to memory of 228 3364 P.O-48452689535945.exe 85 PID 3364 wrote to memory of 228 3364 P.O-48452689535945.exe 85 PID 3364 wrote to memory of 228 3364 P.O-48452689535945.exe 85 PID 3364 wrote to memory of 228 3364 P.O-48452689535945.exe 85 PID 3364 wrote to memory of 228 3364 P.O-48452689535945.exe 85 PID 3364 wrote to memory of 228 3364 P.O-48452689535945.exe 85 PID 3524 wrote to memory of 1040 3524 Explorer.EXE 92 PID 3524 wrote to memory of 1040 3524 Explorer.EXE 92 PID 3524 wrote to memory of 1040 3524 Explorer.EXE 92 PID 1040 wrote to memory of 2088 1040 chkdsk.exe 94 PID 1040 wrote to memory of 2088 1040 chkdsk.exe 94 PID 1040 wrote to memory of 2088 1040 chkdsk.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3524 -
C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:228
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2088
-
-