Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
Saipem Global Inquiry.exe
Resource
win7-20241010-en
General
-
Target
Saipem Global Inquiry.exe
-
Size
395KB
-
MD5
60e43cb34adba8f064b71e6fa476c7e3
-
SHA1
64478dec763afe853f0738d0a64c3734fe7e2b7c
-
SHA256
d29a75e7c31ae88634a19392137bd4c94d6cf4fb739e0e64eb5624a4a7420e68
-
SHA512
ffe8d1c0bdb14ccf4cb3c9ec3e1250dd85e9c2d575c0678295b712d8016787df29c18648e48deffda311ea26ca4a8e2b54a59eb797f80ee7675a9d533a8c1fc7
-
SSDEEP
6144:C6tE6ERQ+3HwO1CcM6RrNev6sKxqfLpEQKk9tF99s2AQuro8Fnh3fOpneW0:CEESo1s6RrNcKwLCQKk9tF9mQOxWg
Malware Config
Extracted
xloader
2.4
cxeo
realtyfindr.com
littlelakesranchcattle.com
mortgagecollective.online
cortenlogistic.com
healthcaresupplyinc.com
abc1229.com
johnlambertsen.online
yasirweb.tech
1398toftsdr.com
chordsofdevils.com
hemetcondos4sale.com
hdtvstoreonline.com
ultimasnoticiaswfmajide2.xyz
soutu6.com
lastmilefast.com
glveye.icu
countinesices.com
savenroar.com
reiwa.cloud
wendsoue.com
rechargehealthco.com
aw6szfrr.xyz
bws-coaching.xyz
cunjvogr.xyz
royalcasino247.com
dshlsc.com
henews.xyz
bouncehousecoral.com
muskokaqualitymaintenance.com
missnco.com
04x5bnr9x8lz.com
base2sin.xyz
flisvoshotel.com
dieteticapeperina.online
mfmasap.com
virusbustersusa.com
noodleboardfrenzy.com
avaeagle.com
infinitikloud.tech
epoxyprosarizona.com
statiproshop.com
g8ti416orb.com
monica-blanco.com
boutechpro.xyz
launchandthriveonline.com
bygning.info
iloveasia.net
swartz.center
circuit.run
thegiftoftrading.com
waploaded.xyz
howtobuyxrpcrypto.com
suchatleb.com
santinoalcalina.com
vepcode.com
rocinanteranch.com
valonour.com
etproof.com
hackettwealth.management
ygm-joyas.com
swagat-restaurant.info
joocyvault.com
mkrdp.com
totojie.com
gretsel.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/4960-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4960-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4960-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1684-26-0x0000000000D00000-0x0000000000D29000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1080 set thread context of 4960 1080 Saipem Global Inquiry.exe 99 PID 4960 set thread context of 3532 4960 Saipem Global Inquiry.exe 56 PID 4960 set thread context of 3532 4960 Saipem Global Inquiry.exe 56 PID 1684 set thread context of 3532 1684 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Saipem Global Inquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 1080 Saipem Global Inquiry.exe 1080 Saipem Global Inquiry.exe 1080 Saipem Global Inquiry.exe 1080 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe 1684 msdt.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 4960 Saipem Global Inquiry.exe 1684 msdt.exe 1684 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1080 Saipem Global Inquiry.exe Token: SeDebugPrivilege 4960 Saipem Global Inquiry.exe Token: SeDebugPrivilege 1684 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1080 wrote to memory of 3404 1080 Saipem Global Inquiry.exe 98 PID 1080 wrote to memory of 3404 1080 Saipem Global Inquiry.exe 98 PID 1080 wrote to memory of 3404 1080 Saipem Global Inquiry.exe 98 PID 1080 wrote to memory of 4960 1080 Saipem Global Inquiry.exe 99 PID 1080 wrote to memory of 4960 1080 Saipem Global Inquiry.exe 99 PID 1080 wrote to memory of 4960 1080 Saipem Global Inquiry.exe 99 PID 1080 wrote to memory of 4960 1080 Saipem Global Inquiry.exe 99 PID 1080 wrote to memory of 4960 1080 Saipem Global Inquiry.exe 99 PID 1080 wrote to memory of 4960 1080 Saipem Global Inquiry.exe 99 PID 3532 wrote to memory of 1684 3532 Explorer.EXE 100 PID 3532 wrote to memory of 1684 3532 Explorer.EXE 100 PID 3532 wrote to memory of 1684 3532 Explorer.EXE 100 PID 1684 wrote to memory of 2332 1684 msdt.exe 101 PID 1684 wrote to memory of 2332 1684 msdt.exe 101 PID 1684 wrote to memory of 2332 1684 msdt.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"3⤵PID:3404
-
-
C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4960
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2332
-
-