Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 22:31
Static task
static1
Behavioral task
behavioral1
Sample
rtgs_pdf.exe
Resource
win7-20241010-en
General
-
Target
rtgs_pdf.exe
-
Size
334KB
-
MD5
2a7387a3d5311f7c3d8ae5bd744314f2
-
SHA1
f4f9b8650afb973059b1ead62f6bab60e52893a9
-
SHA256
9affeeb392ec57f487776cb8da8e8abb89b3250aefa2d2f0b29997b0bd33d00f
-
SHA512
9990eb16fa0273bf02353e107b02d7743e9b9946228465126b511b5c4f974f26a7a72b73fa724d467d29f87aa0107270e7cef7b354f68aea9ddcc02f673e456a
-
SSDEEP
6144:L5R5dVv2Xp7L76Ad+UUT4pOu0u7bNf1bqWDBtAwP/kAGL:dRJm7f6/4jx7bNf5qwVP9
Malware Config
Extracted
xloader
2.3
s9zh
paintedinafrica.com
electrumfix.download
edlange.com
tqiawy.xyz
satiscenter.xyz
nc-affiliates.com
agencybuilderforum.com
testabcde.net
venisseturf.net
rubenvdsande.com
nzmatrimony.com
mdthriftsandflips.com
virtualfxstudio.com
communityinsuranceut.com
qqbokep.com
copeva.net
bookedupdaily.com
houstongrowmyairway.com
fortunapublishing.com
empireplumbingandheating.com
globalefactory.com
alfrednelson.com
kernwide.com
soulwaves.info
iregentos.info
emfirstchoice.com
popvoc.com
clubdeproyectos.com
nathanlaube.net
davaresoon.com
girlsnightoutcollection.net
alchemdiagnostics.com
intlgrowcap.com
northeasttnrentalproperties.com
1971265.com
yobingo.ltd
comunityassn.com
pupupe.com
physicianmedspa.com
forestloretour.com
tauntongo.com
elegancescent.com
traumatotrust.com
blkdenim.com
b-taking.com
naturalhealthadvisery.com
fight-box.com
socia1security.net
prestondelnorteapartments.com
peaclbgju.icu
thegolfclubatcirclec.com
westqueenwestlofts.com
elitedesignzink.com
czpeixun.com
blossomenterpriseuganda.com
danettesgifts.com
psikometriums.com
rainbowbanks.com
deshbari.com
movementspecialistslv.com
amkcar.com
contractorsan.com
onurtel.com
dotalogy.com
destinny.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3640-6-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3640-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4452-17-0x0000000000370000-0x0000000000399000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 916 set thread context of 3640 916 rtgs_pdf.exe 95 PID 3640 set thread context of 3428 3640 vbc.exe 56 PID 4452 set thread context of 3428 4452 mstsc.exe 56 -
Program crash 1 IoCs
pid pid_target Process procid_target 3532 916 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rtgs_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 61 IoCs
pid Process 916 rtgs_pdf.exe 916 rtgs_pdf.exe 916 rtgs_pdf.exe 3640 vbc.exe 3640 vbc.exe 3640 vbc.exe 3640 vbc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe 4452 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3640 vbc.exe 3640 vbc.exe 3640 vbc.exe 4452 mstsc.exe 4452 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 11 IoCs
description pid Process Token: SeDebugPrivilege 916 rtgs_pdf.exe Token: SeDebugPrivilege 3640 vbc.exe Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeShutdownPrivilege 3428 Explorer.EXE Token: SeCreatePagefilePrivilege 3428 Explorer.EXE Token: SeDebugPrivilege 4452 mstsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 916 wrote to memory of 3640 916 rtgs_pdf.exe 95 PID 916 wrote to memory of 3640 916 rtgs_pdf.exe 95 PID 916 wrote to memory of 3640 916 rtgs_pdf.exe 95 PID 916 wrote to memory of 3640 916 rtgs_pdf.exe 95 PID 916 wrote to memory of 3640 916 rtgs_pdf.exe 95 PID 916 wrote to memory of 3640 916 rtgs_pdf.exe 95 PID 3428 wrote to memory of 4452 3428 Explorer.EXE 99 PID 3428 wrote to memory of 4452 3428 Explorer.EXE 99 PID 3428 wrote to memory of 4452 3428 Explorer.EXE 99 PID 4452 wrote to memory of 2840 4452 mstsc.exe 101 PID 4452 wrote to memory of 2840 4452 mstsc.exe 101 PID 4452 wrote to memory of 2840 4452 mstsc.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\rtgs_pdf.exe"C:\Users\Admin\AppData\Local\Temp\rtgs_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 916 -s 10683⤵
- Program crash
PID:3532
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4452 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 916 -ip 9161⤵PID:2736