Analysis
-
max time kernel
146s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
Bonifico n.4301311110000077/Bonifico n.4301311110000077.exe
Resource
win7-20240903-en
General
-
Target
Bonifico n.4301311110000077/Bonifico n.4301311110000077.exe
-
Size
1020KB
-
MD5
3c69123d5a21d83e352662802c332cb8
-
SHA1
7dbfc51c8d209cca3f1f1255e9ef6ef84eb27df6
-
SHA256
4b0315e43226e127abc8f251de5e04dbaa17820b79251810e18494a545012266
-
SHA512
33a5f500ab6841b82ac2fdc3edcb947649049fa13fe0f83e991a65a58d68a86df36bbca9af1c45955f5c026ffd381e8eb7998defaf33e31b3bd4a6e2f847737c
-
SSDEEP
24576:wKBC7nJbsmlUu1sCwj28tfJt9B+P/qbXhuY:wKBC7lsmlxsD2y1bhuY
Malware Config
Extracted
xloader
2.3
a8si
mosquitocontrolpro.com
omfgphil.com
qqkit.net
compusolutionsac.com
skynetaccess.com
helmetmoto.com
webdomoupravitel.com
thepocket-onlinelesson.xyz
stefaniehirsch.space
goalsandballs.com
xn--bro-ba-3ya.com
tomrings.com
4520oceanviewavenue.com
mamaebemorientada.com
shopwreathrails.com
restaurantestancia.com
annaquatics.info
mnarchitect.design
best-cleaner.com
jobhuizhan.com
check-info-bank.network
boostcoachingonline.com
basimogroup.com
076fb5.com
conansr.icu
numbereightturquoise.com
southernbrushworks.com
home-inland.com
irrpa.com
ethereumdailypay.com
betsysellsswfl.com
cutebyconstance.website
modelsnt.com
medifilt.com
tracisolomon.xyz
dchaulingdisposal.com
minchenhy.com
smart4earth.com
rackembilliards.com
benschiller-coaching.com
virtualroasters.com
applewholesales.com
thesidspot.com
grechenblogs.com
marshlandlogisticsservices.net
covidokotoks.com
mirabilla.com
hunab.tech
foreverjsdesigns.com
heipacc.info
simon-schilling.com
shirleyeluiz.com
juguetibicicollectors.com
70shousemanchester.com
tranthaolinh.net
urbanpokebar.com
madras-spice.com
fulmardelta.net
drisu-goalkeeping.com
jiotest.com
vitatiensa.com
melbournebusinesslawyers.net
rajehomes.com
company-for-you.com
rogegalmish.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/1944-8-0x0000000005960000-0x000000000596C000-memory.dmp CustAttr -
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1920-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1920-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1920-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4232-29-0x0000000000950000-0x0000000000979000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1944 set thread context of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 1920 set thread context of 3512 1920 Bonifico n.4301311110000077.exe 56 PID 1920 set thread context of 3512 1920 Bonifico n.4301311110000077.exe 56 PID 4232 set thread context of 3512 4232 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bonifico n.4301311110000077.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe 4232 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 1920 Bonifico n.4301311110000077.exe 4232 cmd.exe 4232 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1920 Bonifico n.4301311110000077.exe Token: SeDebugPrivilege 4232 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 1944 wrote to memory of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 1944 wrote to memory of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 1944 wrote to memory of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 1944 wrote to memory of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 1944 wrote to memory of 1920 1944 Bonifico n.4301311110000077.exe 100 PID 3512 wrote to memory of 4232 3512 Explorer.EXE 101 PID 3512 wrote to memory of 4232 3512 Explorer.EXE 101 PID 3512 wrote to memory of 4232 3512 Explorer.EXE 101 PID 4232 wrote to memory of 2304 4232 cmd.exe 102 PID 4232 wrote to memory of 2304 4232 cmd.exe 102 PID 4232 wrote to memory of 2304 4232 cmd.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1920
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Bonifico n.4301311110000077\Bonifico n.4301311110000077.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2304
-
-