Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
[RFQ] QuotationOrder (SCS).exe
Resource
win7-20240903-en
General
-
Target
[RFQ] QuotationOrder (SCS).exe
-
Size
377KB
-
MD5
505762e94913065a29e28a960c01eff7
-
SHA1
b61de11b6773224f850e1b8841a983337e5c98ac
-
SHA256
be900d129c61d09bf730b02647b272a606bc49e204be55d286ccb892edb961ce
-
SHA512
4a0a62a5cdfd72baf6ec61114d5ef2ecc2e5d6579b7ee3d96452a7a556433d3eefa07aa93ca455e2a097273bcb47ec6838ee4fb3ce0e9eec98b6b999bd16ecf1
-
SSDEEP
6144:9AuZUs9+QjcGioLPv0eXj2EN9hUeEvNcihGIDXT1WP1buDu53:9Hv9/YoQeVueEvNcih9PYuDut
Malware Config
Extracted
xloader
2.5
r0bh
karo-tasty.com
canlioyuncuyuz.online
app-demo.xyz
fountainspringscapemay.com
completefuid.com
sideroyalpalacehotel.website
tollesonhouses.com
zjef.top
fuckingmom89.xyz
toituresante.com
arabatas.com
trans-mall.com
davidruperezdorao.com
cspro-lb.com
xiluoxtmcwj.com
medicinaoralbarcelona.com
rayganesh.com
bakosaoje.xyz
8nst.com
nigeriasecurityexpo.com
geradsss.com
nsureagent.com
luxerlegends.com
usedhondacar.com
39mpt.xyz
pellecorentin.com
suddennnnnnnnnnnn37.xyz
feierabendshop.com
latest-football.pro
mayyaramedical.com
astrielle.com
icobrothers.media
946aaw.net
resourcesassitance.com
divinebaking.online
allmanac.info
mushukids.com
trendytechtreats.com
clubfohl.com
ttportalbham2.com
productzon.net
ambosholmzoril.com
luosenhuagong.com
zhbhhj.com
eclox-btp.com
oldstjoe.com
longshengfz.com
sarasotaexterminator.com
getjoyce.net
game-band.com
5gongvo.xyz
gcioral.xyz
missjones.info
invertirenstartup.com
018seo.com
angeleyesevents.com
heritzlab.com
eleditorplatense.com
ectax.online
ngaviations.com
spiveyvillage.online
heartfeltgiftery.com
resortonannamariais.land
crktinc.com
kjtaxpro.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1540-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1540-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4388-21-0x0000000000D30000-0x0000000000D59000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3588 set thread context of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 1540 set thread context of 3436 1540 [RFQ] QuotationOrder (SCS).exe 56 PID 4388 set thread context of 3436 4388 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language [RFQ] QuotationOrder (SCS).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4388 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1540 [RFQ] QuotationOrder (SCS).exe 1540 [RFQ] QuotationOrder (SCS).exe 1540 [RFQ] QuotationOrder (SCS).exe 1540 [RFQ] QuotationOrder (SCS).exe 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE 4388 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1540 [RFQ] QuotationOrder (SCS).exe 1540 [RFQ] QuotationOrder (SCS).exe 1540 [RFQ] QuotationOrder (SCS).exe 4388 NETSTAT.EXE 4388 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1540 [RFQ] QuotationOrder (SCS).exe Token: SeDebugPrivilege 4388 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3588 wrote to memory of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 3588 wrote to memory of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 3588 wrote to memory of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 3588 wrote to memory of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 3588 wrote to memory of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 3588 wrote to memory of 1540 3588 [RFQ] QuotationOrder (SCS).exe 99 PID 3436 wrote to memory of 4388 3436 Explorer.EXE 100 PID 3436 wrote to memory of 4388 3436 Explorer.EXE 100 PID 3436 wrote to memory of 4388 3436 Explorer.EXE 100 PID 4388 wrote to memory of 1040 4388 NETSTAT.EXE 101 PID 4388 wrote to memory of 1040 4388 NETSTAT.EXE 101 PID 4388 wrote to memory of 1040 4388 NETSTAT.EXE 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3588 -
C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1540
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"3⤵
- System Location Discovery: System Language Discovery
PID:1040
-
-