Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
Saipem Global Inquiry.exe
Resource
win7-20241010-en
General
-
Target
Saipem Global Inquiry.exe
-
Size
395KB
-
MD5
60e43cb34adba8f064b71e6fa476c7e3
-
SHA1
64478dec763afe853f0738d0a64c3734fe7e2b7c
-
SHA256
d29a75e7c31ae88634a19392137bd4c94d6cf4fb739e0e64eb5624a4a7420e68
-
SHA512
ffe8d1c0bdb14ccf4cb3c9ec3e1250dd85e9c2d575c0678295b712d8016787df29c18648e48deffda311ea26ca4a8e2b54a59eb797f80ee7675a9d533a8c1fc7
-
SSDEEP
6144:C6tE6ERQ+3HwO1CcM6RrNev6sKxqfLpEQKk9tF99s2AQuro8Fnh3fOpneW0:CEESo1s6RrNcKwLCQKk9tF9mQOxWg
Malware Config
Extracted
xloader
2.4
cxeo
realtyfindr.com
littlelakesranchcattle.com
mortgagecollective.online
cortenlogistic.com
healthcaresupplyinc.com
abc1229.com
johnlambertsen.online
yasirweb.tech
1398toftsdr.com
chordsofdevils.com
hemetcondos4sale.com
hdtvstoreonline.com
ultimasnoticiaswfmajide2.xyz
soutu6.com
lastmilefast.com
glveye.icu
countinesices.com
savenroar.com
reiwa.cloud
wendsoue.com
rechargehealthco.com
aw6szfrr.xyz
bws-coaching.xyz
cunjvogr.xyz
royalcasino247.com
dshlsc.com
henews.xyz
bouncehousecoral.com
muskokaqualitymaintenance.com
missnco.com
04x5bnr9x8lz.com
base2sin.xyz
flisvoshotel.com
dieteticapeperina.online
mfmasap.com
virusbustersusa.com
noodleboardfrenzy.com
avaeagle.com
infinitikloud.tech
epoxyprosarizona.com
statiproshop.com
g8ti416orb.com
monica-blanco.com
boutechpro.xyz
launchandthriveonline.com
bygning.info
iloveasia.net
swartz.center
circuit.run
thegiftoftrading.com
waploaded.xyz
howtobuyxrpcrypto.com
suchatleb.com
santinoalcalina.com
vepcode.com
rocinanteranch.com
valonour.com
etproof.com
hackettwealth.management
ygm-joyas.com
swagat-restaurant.info
joocyvault.com
mkrdp.com
totojie.com
gretsel.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/3004-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3004-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2572-22-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2172 set thread context of 3004 2172 Saipem Global Inquiry.exe 30 PID 3004 set thread context of 1192 3004 Saipem Global Inquiry.exe 20 PID 2572 set thread context of 1192 2572 wininit.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Saipem Global Inquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2172 Saipem Global Inquiry.exe 2172 Saipem Global Inquiry.exe 2172 Saipem Global Inquiry.exe 2172 Saipem Global Inquiry.exe 3004 Saipem Global Inquiry.exe 3004 Saipem Global Inquiry.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe 2572 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3004 Saipem Global Inquiry.exe 3004 Saipem Global Inquiry.exe 3004 Saipem Global Inquiry.exe 2572 wininit.exe 2572 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2172 Saipem Global Inquiry.exe Token: SeDebugPrivilege 3004 Saipem Global Inquiry.exe Token: SeDebugPrivilege 2572 wininit.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2172 wrote to memory of 3000 2172 Saipem Global Inquiry.exe 29 PID 2172 wrote to memory of 3000 2172 Saipem Global Inquiry.exe 29 PID 2172 wrote to memory of 3000 2172 Saipem Global Inquiry.exe 29 PID 2172 wrote to memory of 3000 2172 Saipem Global Inquiry.exe 29 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 2172 wrote to memory of 3004 2172 Saipem Global Inquiry.exe 30 PID 1192 wrote to memory of 2572 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2572 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2572 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2572 1192 Explorer.EXE 31 PID 2572 wrote to memory of 2696 2572 wininit.exe 32 PID 2572 wrote to memory of 2696 2572 wininit.exe 32 PID 2572 wrote to memory of 2696 2572 wininit.exe 32 PID 2572 wrote to memory of 2696 2572 wininit.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"3⤵PID:3000
-
-
C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3004
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2696
-
-