Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
rtgs_pdf.exe
Resource
win7-20241010-en
General
-
Target
rtgs_pdf.exe
-
Size
334KB
-
MD5
2a7387a3d5311f7c3d8ae5bd744314f2
-
SHA1
f4f9b8650afb973059b1ead62f6bab60e52893a9
-
SHA256
9affeeb392ec57f487776cb8da8e8abb89b3250aefa2d2f0b29997b0bd33d00f
-
SHA512
9990eb16fa0273bf02353e107b02d7743e9b9946228465126b511b5c4f974f26a7a72b73fa724d467d29f87aa0107270e7cef7b354f68aea9ddcc02f673e456a
-
SSDEEP
6144:L5R5dVv2Xp7L76Ad+UUT4pOu0u7bNf1bqWDBtAwP/kAGL:dRJm7f6/4jx7bNf5qwVP9
Malware Config
Extracted
xloader
2.3
s9zh
paintedinafrica.com
electrumfix.download
edlange.com
tqiawy.xyz
satiscenter.xyz
nc-affiliates.com
agencybuilderforum.com
testabcde.net
venisseturf.net
rubenvdsande.com
nzmatrimony.com
mdthriftsandflips.com
virtualfxstudio.com
communityinsuranceut.com
qqbokep.com
copeva.net
bookedupdaily.com
houstongrowmyairway.com
fortunapublishing.com
empireplumbingandheating.com
globalefactory.com
alfrednelson.com
kernwide.com
soulwaves.info
iregentos.info
emfirstchoice.com
popvoc.com
clubdeproyectos.com
nathanlaube.net
davaresoon.com
girlsnightoutcollection.net
alchemdiagnostics.com
intlgrowcap.com
northeasttnrentalproperties.com
1971265.com
yobingo.ltd
comunityassn.com
pupupe.com
physicianmedspa.com
forestloretour.com
tauntongo.com
elegancescent.com
traumatotrust.com
blkdenim.com
b-taking.com
naturalhealthadvisery.com
fight-box.com
socia1security.net
prestondelnorteapartments.com
peaclbgju.icu
thegolfclubatcirclec.com
westqueenwestlofts.com
elitedesignzink.com
czpeixun.com
blossomenterpriseuganda.com
danettesgifts.com
psikometriums.com
rainbowbanks.com
deshbari.com
movementspecialistslv.com
amkcar.com
contractorsan.com
onurtel.com
dotalogy.com
destinny.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2940-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2940-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2912-20-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2536 set thread context of 2940 2536 rtgs_pdf.exe 31 PID 2940 set thread context of 1256 2940 vbc.exe 21 PID 2912 set thread context of 1256 2912 svchost.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtgs_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2536 rtgs_pdf.exe 2536 rtgs_pdf.exe 2940 vbc.exe 2940 vbc.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe 2912 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2940 vbc.exe 2940 vbc.exe 2940 vbc.exe 2912 svchost.exe 2912 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2536 rtgs_pdf.exe Token: SeDebugPrivilege 2940 vbc.exe Token: SeDebugPrivilege 2912 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 2536 wrote to memory of 2940 2536 rtgs_pdf.exe 31 PID 1256 wrote to memory of 2912 1256 Explorer.EXE 32 PID 1256 wrote to memory of 2912 1256 Explorer.EXE 32 PID 1256 wrote to memory of 2912 1256 Explorer.EXE 32 PID 1256 wrote to memory of 2912 1256 Explorer.EXE 32 PID 2912 wrote to memory of 648 2912 svchost.exe 33 PID 2912 wrote to memory of 648 2912 svchost.exe 33 PID 2912 wrote to memory of 648 2912 svchost.exe 33 PID 2912 wrote to memory of 648 2912 svchost.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\rtgs_pdf.exe"C:\Users\Admin\AppData\Local\Temp\rtgs_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2940
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:648
-
-