Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
02-10-2024 00:18
Static task
static1
Behavioral task
behavioral1
Sample
Payment Slip.exe
Resource
win7-20240708-en
General
-
Target
Payment Slip.exe
-
Size
223KB
-
MD5
5cdcec900819b181a01ea4c007995969
-
SHA1
d71954224a3c986ac4a7f116d4067d98257cfbb5
-
SHA256
7fd75617ee39e8ed51f7e118f0aa46b83916dbf0d1d769e088c3fca7a4c0014f
-
SHA512
e741d7658397cb8f8c581bd3d2c3807b93f9e987ff10668e5d7cea6dee149553392ee32be3983cc4adc9340cfe9ff3915a91faec9ad4a74574c0299d6c4761ad
-
SSDEEP
3072:1g10r0K/C7MAov2zdV2JE/0unArFJHJlrAlfidgVkmv058mZT6+upQkdO7:1q0rpsMA+krMBBJHJZdnrb6+uQ
Malware Config
Extracted
xloader
2.3
ieqo
new-post-25782.xyz
podcastrrr.com
babyspageelong.com
boaddeo.club
distribuzionemedica.com
peaceofminderbinder.com
abbyrosemusic.com
odessawildliferemoval.com
prosperasight.com
liibbyapp.com
shandaferguson.com
kirsehiryenihaber.com
secured07b-chase.com
leanonmelifeadvice.com
securemtgs.com
temgk255.space
lunasparallevar.com
transportesdario.com
redwork.club
directopolis.com
sorevcbns.com
bibliothecadigital.com
theagileconfessional.com
lebottindesentreprises.com
dvd-org.com
1ajycapital.com
nailquan2.com
javacoffeebeans.com
sizish.com
susannhaehnel.net
gouaya.com
marvelstrikeclub.com
catwalkangels.com
runlywood-nambda.icu
hongfengjmzz.com
reviveyourride-detailing.com
x93snefkb9.com
irsettlement.com
injurylawyersnm.com
zhcc.ltd
homerivercommercial.com
drkitange.com
atauysal.com
sleekedup.net
ez-insurance-quotes.com
lumber-pt.com
citi-star.taxi
chimaratransport.com
absbropaul.com
jewelsbybri.com
racevc.com
buyer-centric.com
viableprocedure.com
paarlstudio.com
thinbluelinepatriots.com
crowtzequipped.com
missioncareasia.com
tesrvstorage.com
xn--zfrz5x6lhwxt66f.tech
mansmoon.com
werkstrand.cloud
amoscontent.com
exainc.net
cigartent.com
rukreditpay.com
Signatures
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2156-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2156-6-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2156-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2768-17-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2944 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2480 set thread context of 2156 2480 Payment Slip.exe 30 PID 2156 set thread context of 1192 2156 Payment Slip.exe 21 PID 2156 set thread context of 1192 2156 Payment Slip.exe 21 PID 2768 set thread context of 1192 2768 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Slip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Slip.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2156 Payment Slip.exe 2156 Payment Slip.exe 2156 Payment Slip.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe 2768 cmmon32.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2480 Payment Slip.exe 2156 Payment Slip.exe 2156 Payment Slip.exe 2156 Payment Slip.exe 2156 Payment Slip.exe 2768 cmmon32.exe 2768 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2156 Payment Slip.exe Token: SeDebugPrivilege 2768 cmmon32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2480 wrote to memory of 2156 2480 Payment Slip.exe 30 PID 2480 wrote to memory of 2156 2480 Payment Slip.exe 30 PID 2480 wrote to memory of 2156 2480 Payment Slip.exe 30 PID 2480 wrote to memory of 2156 2480 Payment Slip.exe 30 PID 2480 wrote to memory of 2156 2480 Payment Slip.exe 30 PID 2156 wrote to memory of 2768 2156 Payment Slip.exe 31 PID 2156 wrote to memory of 2768 2156 Payment Slip.exe 31 PID 2156 wrote to memory of 2768 2156 Payment Slip.exe 31 PID 2156 wrote to memory of 2768 2156 Payment Slip.exe 31 PID 2768 wrote to memory of 2944 2768 cmmon32.exe 32 PID 2768 wrote to memory of 2944 2768 cmmon32.exe 32 PID 2768 wrote to memory of 2944 2768 cmmon32.exe 32 PID 2768 wrote to memory of 2944 2768 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment Slip.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2944
-
-
-
-