Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
Bonifico n.4301311110000077/Bonifico n.4301311110000077.exe
Resource
win7-20240903-en
General
-
Target
Bonifico n.4301311110000077/Bonifico n.4301311110000077.exe
-
Size
1020KB
-
MD5
3c69123d5a21d83e352662802c332cb8
-
SHA1
7dbfc51c8d209cca3f1f1255e9ef6ef84eb27df6
-
SHA256
4b0315e43226e127abc8f251de5e04dbaa17820b79251810e18494a545012266
-
SHA512
33a5f500ab6841b82ac2fdc3edcb947649049fa13fe0f83e991a65a58d68a86df36bbca9af1c45955f5c026ffd381e8eb7998defaf33e31b3bd4a6e2f847737c
-
SSDEEP
24576:wKBC7nJbsmlUu1sCwj28tfJt9B+P/qbXhuY:wKBC7lsmlxsD2y1bhuY
Malware Config
Extracted
xloader
2.3
a8si
mosquitocontrolpro.com
omfgphil.com
qqkit.net
compusolutionsac.com
skynetaccess.com
helmetmoto.com
webdomoupravitel.com
thepocket-onlinelesson.xyz
stefaniehirsch.space
goalsandballs.com
xn--bro-ba-3ya.com
tomrings.com
4520oceanviewavenue.com
mamaebemorientada.com
shopwreathrails.com
restaurantestancia.com
annaquatics.info
mnarchitect.design
best-cleaner.com
jobhuizhan.com
check-info-bank.network
boostcoachingonline.com
basimogroup.com
076fb5.com
conansr.icu
numbereightturquoise.com
southernbrushworks.com
home-inland.com
irrpa.com
ethereumdailypay.com
betsysellsswfl.com
cutebyconstance.website
modelsnt.com
medifilt.com
tracisolomon.xyz
dchaulingdisposal.com
minchenhy.com
smart4earth.com
rackembilliards.com
benschiller-coaching.com
virtualroasters.com
applewholesales.com
thesidspot.com
grechenblogs.com
marshlandlogisticsservices.net
covidokotoks.com
mirabilla.com
hunab.tech
foreverjsdesigns.com
heipacc.info
simon-schilling.com
shirleyeluiz.com
juguetibicicollectors.com
70shousemanchester.com
tranthaolinh.net
urbanpokebar.com
madras-spice.com
fulmardelta.net
drisu-goalkeeping.com
jiotest.com
vitatiensa.com
melbournebusinesslawyers.net
rajehomes.com
company-for-you.com
rogegalmish.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1964-2-0x0000000000910000-0x000000000091C000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/676-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/676-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1196-26-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1892 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1964 set thread context of 676 1964 Bonifico n.4301311110000077.exe 31 PID 676 set thread context of 1108 676 Bonifico n.4301311110000077.exe 20 PID 1196 set thread context of 1108 1196 cmd.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bonifico n.4301311110000077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 11 IoCs
pid Process 676 Bonifico n.4301311110000077.exe 676 Bonifico n.4301311110000077.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe 1196 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 676 Bonifico n.4301311110000077.exe 676 Bonifico n.4301311110000077.exe 676 Bonifico n.4301311110000077.exe 1196 cmd.exe 1196 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 676 Bonifico n.4301311110000077.exe Token: SeDebugPrivilege 1196 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1964 wrote to memory of 676 1964 Bonifico n.4301311110000077.exe 31 PID 1108 wrote to memory of 1196 1108 Explorer.EXE 32 PID 1108 wrote to memory of 1196 1108 Explorer.EXE 32 PID 1108 wrote to memory of 1196 1108 Explorer.EXE 32 PID 1108 wrote to memory of 1196 1108 Explorer.EXE 32 PID 1196 wrote to memory of 1892 1196 cmd.exe 33 PID 1196 wrote to memory of 1892 1196 cmd.exe 33 PID 1196 wrote to memory of 1892 1196 cmd.exe 33 PID 1196 wrote to memory of 1892 1196 cmd.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:676
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1892
-
-