Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240903-en
General
-
Target
Order.exe
-
Size
781KB
-
MD5
5bb832062f9c79305f4a49e404534386
-
SHA1
419733fb51fa058a7fa4337c6d9b8b370c214230
-
SHA256
dbdffd74b6ea1de962cb1e64468cbc4cac545311c1bc3eddfed142fb57125002
-
SHA512
ea9b8683bd01f5066442f1ac11e4f253891c24a9ee4c02b9277af89a9f87f72923f1acbc140df2133bf87c1fe42e15a910fef873e981878b5d63f507e7e1c986
-
SSDEEP
12288:2JZaF9GF2zrySIOBLpO5V0ouuMHrgBSvsI7qbBgx0r88WlvZK13Yjpr7AFb5VR+7:JjaSIc6Juu8QSUIDxlHZKedrWbRFef
Malware Config
Extracted
xloader
2.3
pz9b
gochili.info
cyberdatadefence.com
payonbux.com
candiceswanepoelbrasil.com
mykaoa.com
tanabe-kanagu.com
dovetailgoodlife.xyz
alabasterautomotive.com
tajc.club
authwdqtsi6sojynof9gmazon.com
cookingguides.net
yah360.com
berriq.com
freetoreview.online
yachtsgoneonline.com
clothestokidsri.com
howtogetstartedwithfba.com
simplepartyplanning.com
sunrisekai.com
wealthfarmer.net
indumaqservicios.com
sanookna.com
stgg.net
resultrun.info
dynamismedical.com
katfacecosmetics.com
wjlzbc.com
madebymygypsysoul.com
belpair.net
aktamusic.com
generationathletic.fitness
artandscience.info
timbisoaps.com
foursonsltd.com
komitmenindonesiasejahtera.com
buildingbusinessonline.net
nativeiso.com
sagalocal.icu
deepcombine.com
conecationsystemss.net
airtech-engineers.com
rjccollectibles.com
haegrumfood.com
brunchtimes.com
beautifulbodyz.com
vidaifriend.com
blinbins.com
cvnsm2020.com
thompsonwebmanagement.com
xn--lichthlzer-jcb.com
tyrellsaintvil.com
charismaadvice.com
webshopfront.com
creativesoulsclubs.com
schul-service.com
maridaniellecontreras.com
thefreelancerzone.com
1000-help4.club
thecookiechicktx.com
mutschein.com
balveny.com
sorteesportiva.bet
adamsandfane.com
ashleyjordanoutlaws.com
generalplex.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2800-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2800-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2828-25-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2592 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3016 set thread context of 2800 3016 Order.exe 31 PID 2800 set thread context of 1192 2800 Order.exe 21 PID 2828 set thread context of 1192 2828 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2800 Order.exe 2800 Order.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe 2828 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2800 Order.exe 2800 Order.exe 2800 Order.exe 2828 control.exe 2828 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2800 Order.exe Token: SeDebugPrivilege 2828 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 3016 wrote to memory of 2800 3016 Order.exe 31 PID 1192 wrote to memory of 2828 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2828 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2828 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2828 1192 Explorer.EXE 32 PID 2828 wrote to memory of 2592 2828 control.exe 33 PID 2828 wrote to memory of 2592 2828 control.exe 33 PID 2828 wrote to memory of 2592 2828 control.exe 33 PID 2828 wrote to memory of 2592 2828 control.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2800
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2592
-
-