Analysis
-
max time kernel
148s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
28-09-2024 11:03
Static task
static1
Behavioral task
behavioral1
Sample
Invoice#00086770.exe
Resource
win7-20240903-en
General
-
Target
Invoice#00086770.exe
-
Size
681KB
-
MD5
9959299149ec0cc5d9c380a308f69f31
-
SHA1
2b98e45b2dd60c8e3f154e80f10b2bcc07bfca90
-
SHA256
b9e50b873e6ca85c0ebcd953a403425a5c7da2e57ffe47723e21cccf8cebde06
-
SHA512
60fd97abd4fa62686266cecb9832ba50118671dce411dfcda9dc7b6db516eb0405a0783739fe1e9e920feb90e51f73b0bd6a9cc9decb75288edab0923b87ada1
-
SSDEEP
12288:w5cYv2tasGHW/NqrFnHqgpztNwN/wgHQHewItAVjmRg2W9fvEwsJ:wvutasoWFEHjzIwoQ+w9Ycf9sJ
Malware Config
Extracted
xloader
2.3
d8ak
bossmatter.com
intanmandirilestari.com
goldsgymclermont.com
nythraa.com
xbfcyy.com
precitaparktownhome.com
medicalmarijuanamississippi.net
mademoisellepierre.com
duantui.run
freebay.info
gabimslogistics.com
planethomrlending.com
thesockboutique.net
freiundgeist.com
nouvellechina.com
hkamlcc.com
heti-lainaa.com
forehead-effort.com
productsim.com
dualexpressions.com
theriddimnation.com
mysweetleilani.com
mzsanxie.com
steelstructuresolutions.com
thebrowbandit.info
carolinahouseandhome.com
xn--cck0cya3lt22phzggtpit2b.com
yotctae.com
humlaapp.com
escueladebarman.com
7788290.net
bostonm.info
id186716208.xyz
hflwd.com
element-keys.com
benchmark-aif.com
wholefoodsweets.com
styledbyzy.com
peaksuspectusa.com
sneakerclones.com
offgridoverlanding.com
shaynewhittington.com
chinahaogt.com
toaskungfu.com
youngevitywallach.com
goldtradesolution.com
idosgames.com
10-34-221-34.com
cnconnect3.club
sunshineallstars.com
countrysidebuilder.com
exactto.store
weallriseas.one
xpresssteamironing.com
2ts3a.net
villelowtech.com
estudioenergias.com
kingdombless.info
katchrated.com
deepakdishes.com
globalsuvrussia.com
oasisprovidence.com
beuscissors.com
freebirdsafari.com
wintergabriel.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/3768-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3768-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1844-21-0x00000000005A0000-0x00000000005C9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Invoice#00086770.exeInvoice#00086770.exewscript.exedescription pid Process procid_target PID 1328 set thread context of 3768 1328 Invoice#00086770.exe 98 PID 3768 set thread context of 3492 3768 Invoice#00086770.exe 56 PID 1844 set thread context of 3492 1844 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Invoice#00086770.exewscript.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Invoice#00086770.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
Processes:
Invoice#00086770.exewscript.exepid Process 3768 Invoice#00086770.exe 3768 Invoice#00086770.exe 3768 Invoice#00086770.exe 3768 Invoice#00086770.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe 1844 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Invoice#00086770.exewscript.exepid Process 3768 Invoice#00086770.exe 3768 Invoice#00086770.exe 3768 Invoice#00086770.exe 1844 wscript.exe 1844 wscript.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
Invoice#00086770.exewscript.exeExplorer.EXEdescription pid Process Token: SeDebugPrivilege 3768 Invoice#00086770.exe Token: SeDebugPrivilege 1844 wscript.exe Token: SeShutdownPrivilege 3492 Explorer.EXE Token: SeCreatePagefilePrivilege 3492 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Invoice#00086770.exeExplorer.EXEwscript.exedescription pid Process procid_target PID 1328 wrote to memory of 3768 1328 Invoice#00086770.exe 98 PID 1328 wrote to memory of 3768 1328 Invoice#00086770.exe 98 PID 1328 wrote to memory of 3768 1328 Invoice#00086770.exe 98 PID 1328 wrote to memory of 3768 1328 Invoice#00086770.exe 98 PID 1328 wrote to memory of 3768 1328 Invoice#00086770.exe 98 PID 1328 wrote to memory of 3768 1328 Invoice#00086770.exe 98 PID 3492 wrote to memory of 1844 3492 Explorer.EXE 99 PID 3492 wrote to memory of 1844 3492 Explorer.EXE 99 PID 3492 wrote to memory of 1844 3492 Explorer.EXE 99 PID 1844 wrote to memory of 3696 1844 wscript.exe 101 PID 1844 wrote to memory of 3696 1844 wscript.exe 101 PID 1844 wrote to memory of 3696 1844 wscript.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3492 -
C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1328 -
C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3768
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice#00086770.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3696
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4252,i,2727319350781907497,7925939240893079607,262144 --variations-seed-version --mojo-platform-channel-handle=3952 /prefetch:81⤵PID:2984