Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240903-en
General
-
Target
Order.exe
-
Size
781KB
-
MD5
5bb832062f9c79305f4a49e404534386
-
SHA1
419733fb51fa058a7fa4337c6d9b8b370c214230
-
SHA256
dbdffd74b6ea1de962cb1e64468cbc4cac545311c1bc3eddfed142fb57125002
-
SHA512
ea9b8683bd01f5066442f1ac11e4f253891c24a9ee4c02b9277af89a9f87f72923f1acbc140df2133bf87c1fe42e15a910fef873e981878b5d63f507e7e1c986
-
SSDEEP
12288:2JZaF9GF2zrySIOBLpO5V0ouuMHrgBSvsI7qbBgx0r88WlvZK13Yjpr7AFb5VR+7:JjaSIc6Juu8QSUIDxlHZKedrWbRFef
Malware Config
Extracted
xloader
2.3
pz9b
gochili.info
cyberdatadefence.com
payonbux.com
candiceswanepoelbrasil.com
mykaoa.com
tanabe-kanagu.com
dovetailgoodlife.xyz
alabasterautomotive.com
tajc.club
authwdqtsi6sojynof9gmazon.com
cookingguides.net
yah360.com
berriq.com
freetoreview.online
yachtsgoneonline.com
clothestokidsri.com
howtogetstartedwithfba.com
simplepartyplanning.com
sunrisekai.com
wealthfarmer.net
indumaqservicios.com
sanookna.com
stgg.net
resultrun.info
dynamismedical.com
katfacecosmetics.com
wjlzbc.com
madebymygypsysoul.com
belpair.net
aktamusic.com
generationathletic.fitness
artandscience.info
timbisoaps.com
foursonsltd.com
komitmenindonesiasejahtera.com
buildingbusinessonline.net
nativeiso.com
sagalocal.icu
deepcombine.com
conecationsystemss.net
airtech-engineers.com
rjccollectibles.com
haegrumfood.com
brunchtimes.com
beautifulbodyz.com
vidaifriend.com
blinbins.com
cvnsm2020.com
thompsonwebmanagement.com
xn--lichthlzer-jcb.com
tyrellsaintvil.com
charismaadvice.com
webshopfront.com
creativesoulsclubs.com
schul-service.com
maridaniellecontreras.com
thefreelancerzone.com
1000-help4.club
thecookiechicktx.com
mutschein.com
balveny.com
sorteesportiva.bet
adamsandfane.com
ashleyjordanoutlaws.com
generalplex.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3484-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3484-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3384-24-0x0000000000960000-0x0000000000988000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2140 set thread context of 3484 2140 Order.exe 99 PID 3484 set thread context of 2836 3484 Order.exe 54 PID 3384 set thread context of 2836 3384 WWAHost.exe 54 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3484 Order.exe 3484 Order.exe 3484 Order.exe 3484 Order.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe 3384 WWAHost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3484 Order.exe 3484 Order.exe 3484 Order.exe 3384 WWAHost.exe 3384 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3484 Order.exe Token: SeDebugPrivilege 3384 WWAHost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2140 wrote to memory of 3484 2140 Order.exe 99 PID 2140 wrote to memory of 3484 2140 Order.exe 99 PID 2140 wrote to memory of 3484 2140 Order.exe 99 PID 2140 wrote to memory of 3484 2140 Order.exe 99 PID 2140 wrote to memory of 3484 2140 Order.exe 99 PID 2140 wrote to memory of 3484 2140 Order.exe 99 PID 2836 wrote to memory of 3384 2836 Explorer.EXE 100 PID 2836 wrote to memory of 3384 2836 Explorer.EXE 100 PID 2836 wrote to memory of 3384 2836 Explorer.EXE 100 PID 3384 wrote to memory of 4516 3384 WWAHost.exe 101 PID 3384 wrote to memory of 4516 3384 WWAHost.exe 101 PID 3384 wrote to memory of 4516 3384 WWAHost.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3384 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4516
-
-