Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
28/09/2024, 11:03
Static task
static1
Behavioral task
behavioral1
Sample
Invoice#00086770.exe
Resource
win7-20240903-en
General
-
Target
Invoice#00086770.exe
-
Size
681KB
-
MD5
9959299149ec0cc5d9c380a308f69f31
-
SHA1
2b98e45b2dd60c8e3f154e80f10b2bcc07bfca90
-
SHA256
b9e50b873e6ca85c0ebcd953a403425a5c7da2e57ffe47723e21cccf8cebde06
-
SHA512
60fd97abd4fa62686266cecb9832ba50118671dce411dfcda9dc7b6db516eb0405a0783739fe1e9e920feb90e51f73b0bd6a9cc9decb75288edab0923b87ada1
-
SSDEEP
12288:w5cYv2tasGHW/NqrFnHqgpztNwN/wgHQHewItAVjmRg2W9fvEwsJ:wvutasoWFEHjzIwoQ+w9Ycf9sJ
Malware Config
Extracted
xloader
2.3
d8ak
bossmatter.com
intanmandirilestari.com
goldsgymclermont.com
nythraa.com
xbfcyy.com
precitaparktownhome.com
medicalmarijuanamississippi.net
mademoisellepierre.com
duantui.run
freebay.info
gabimslogistics.com
planethomrlending.com
thesockboutique.net
freiundgeist.com
nouvellechina.com
hkamlcc.com
heti-lainaa.com
forehead-effort.com
productsim.com
dualexpressions.com
theriddimnation.com
mysweetleilani.com
mzsanxie.com
steelstructuresolutions.com
thebrowbandit.info
carolinahouseandhome.com
xn--cck0cya3lt22phzggtpit2b.com
yotctae.com
humlaapp.com
escueladebarman.com
7788290.net
bostonm.info
id186716208.xyz
hflwd.com
element-keys.com
benchmark-aif.com
wholefoodsweets.com
styledbyzy.com
peaksuspectusa.com
sneakerclones.com
offgridoverlanding.com
shaynewhittington.com
chinahaogt.com
toaskungfu.com
youngevitywallach.com
goldtradesolution.com
idosgames.com
10-34-221-34.com
cnconnect3.club
sunshineallstars.com
countrysidebuilder.com
exactto.store
weallriseas.one
xpresssteamironing.com
2ts3a.net
villelowtech.com
estudioenergias.com
kingdombless.info
katchrated.com
deepakdishes.com
globalsuvrussia.com
oasisprovidence.com
beuscissors.com
freebirdsafari.com
wintergabriel.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2816-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2816-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2644-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2388 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2068 set thread context of 2816 2068 Invoice#00086770.exe 30 PID 2816 set thread context of 1188 2816 Invoice#00086770.exe 21 PID 2644 set thread context of 1188 2644 NETSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Invoice#00086770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2644 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2816 Invoice#00086770.exe 2816 Invoice#00086770.exe 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE 2644 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2816 Invoice#00086770.exe 2816 Invoice#00086770.exe 2816 Invoice#00086770.exe 2644 NETSTAT.EXE 2644 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2816 Invoice#00086770.exe Token: SeDebugPrivilege 2644 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 2068 wrote to memory of 2816 2068 Invoice#00086770.exe 30 PID 1188 wrote to memory of 2644 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2644 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2644 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2644 1188 Explorer.EXE 31 PID 2644 wrote to memory of 2388 2644 NETSTAT.EXE 32 PID 2644 wrote to memory of 2388 2644 NETSTAT.EXE 32 PID 2644 wrote to memory of 2388 2644 NETSTAT.EXE 32 PID 2644 wrote to memory of 2388 2644 NETSTAT.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2816
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2388
-
-