Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:18
Static task
static1
Behavioral task
behavioral1
Sample
proforma invoice.exe
Resource
win7-20241010-en
General
-
Target
proforma invoice.exe
-
Size
952KB
-
MD5
e47b1ea33b1abf2f4fb8ea4033085f5f
-
SHA1
b03c03eaabbb7a9f400004115a80087f49c7d24d
-
SHA256
2f149eeefba021804e56e884c6a0b9b20a0205104976741b9f7255ec60e4872f
-
SHA512
e4ec9343ae245a4fa2ba47250cd334adb15a8071df54b6eec5db3f5214044135cdee3da0d17873df7837f567b1fd38657d19e401e39222f34bc4966db979e033
-
SSDEEP
12288:9iDerSToYkbL9AvIQYci7fep8aLBdi1WWbdNIQvr5I:99bJATYnCr21WCdWA
Malware Config
Extracted
xloader
2.3
xfts
dailiesplatform.com
krlanka.com
koms.info
chesslearner.com
softwarefully.com
yogiplayground.com
learhee.com
faithbook.info
pepperrefo.com
kratochvil-elektro.com
artbyg2.com
123-e.com
levelupyourbody.info
ecommercebusinessowner.com
floraseriestrilogy.com
sdyykt.com
swchof.com
huaxinhui.tech
sems-iress2016.com
vasudhalibrary.com
chummakizhi.com
gosleep-vietnam.com
plafon.one
sneakyhenry.com
x1699.com
flora4me.com
goofballtheclown.com
luckysevenboxesdesign.com
bioseefit-genuine.com
rjuanca.com
projectorcity.net
sustainablemedia.global
autoimmuneanswers.net
lessismoreee.com
xn--80aabjg7ciie7f.xn--p1acf
yourmoneyfuther.com
theatricsvirtual.com
appalachianholisticdentist.com
blaxies3.com
partycc.com
for-all-dream.com
szrhyl.com
databolism.com
loyalimportados.com
burnvioletinternational.com
graceinperspective.life
artsandfoodnyc.recipes
design4sys.com
medicalscreech.life
seeyouseeme.net
cernerarchive.net
ketamineinfusioncalgary.com
leagueofconsciouscreatives.com
triggerfishgroup.com
de-la-platiada.info
whatsmycurrency.com
stainset.com
museanimations.com
vip-5.com
corollabeachsetups.com
arcpest.com
kusamac.com
mustaphaswinga.com
dofreemovies.com
shhxqg.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2612-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2612-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2612-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1064-28-0x0000000000A10000-0x0000000000A39000-memory.dmp xloader -
Blocklisted process makes network request 2 IoCs
flow pid Process 48 1064 cmd.exe 53 1064 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1948 set thread context of 2612 1948 proforma invoice.exe 90 PID 2612 set thread context of 3444 2612 proforma invoice.exe 56 PID 2612 set thread context of 3444 2612 proforma invoice.exe 56 PID 1064 set thread context of 3444 1064 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language proforma invoice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 1948 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe 1064 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2612 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 2612 proforma invoice.exe 1064 cmd.exe 1064 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1948 proforma invoice.exe Token: SeDebugPrivilege 2612 proforma invoice.exe Token: SeDebugPrivilege 1064 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1948 wrote to memory of 2612 1948 proforma invoice.exe 90 PID 1948 wrote to memory of 2612 1948 proforma invoice.exe 90 PID 1948 wrote to memory of 2612 1948 proforma invoice.exe 90 PID 1948 wrote to memory of 2612 1948 proforma invoice.exe 90 PID 1948 wrote to memory of 2612 1948 proforma invoice.exe 90 PID 1948 wrote to memory of 2612 1948 proforma invoice.exe 90 PID 3444 wrote to memory of 1064 3444 Explorer.EXE 92 PID 3444 wrote to memory of 1064 3444 Explorer.EXE 92 PID 3444 wrote to memory of 1064 3444 Explorer.EXE 92 PID 1064 wrote to memory of 1772 1064 cmd.exe 93 PID 1064 wrote to memory of 1772 1064 cmd.exe 93 PID 1064 wrote to memory of 1772 1064 cmd.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2612
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\proforma invoice.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1772
-
-