Analysis
-
max time kernel
149s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:19
Static task
static1
Behavioral task
behavioral1
Sample
PO.20586829.exe
Resource
win7-20240708-en
General
-
Target
PO.20586829.exe
-
Size
1.2MB
-
MD5
b45e34aecf9c73c7fb54edab05973e42
-
SHA1
41861a63a47b4d1a70d4d81dbde119bfb893abdc
-
SHA256
36a6dd99705baa431be4fa3b3d1223e540a171d419b79d0c466916269fb8608f
-
SHA512
d698e753d4d7a4141c6cfc6e7baa43e551a033cb0ddbc93a2cf229a450f24ef5bf106acff221241928b9612067a9e9eb178d722b21bed5ab9bb2ec54d35132f2
-
SSDEEP
24576:NyUDWIp7eS8sP60XYwxx3CZswC15rafWV/Nm/y12NhmI:A1ITV9XHSZCjaNyY/
Malware Config
Extracted
xloader
2.3
imta
conditions-credits.net
tamaracatharina-creative.com
semogalanggeng.com
lasvegascourier.com
loginkopi.com
easyspeak.life
alternacanarias.com
pasaeli.net
veragarcia.net
texassandhaulers.com
ihbonline.com
getawaytocornwall.com
vanilzamisturini.com
privatecine.com
picsag.com
rougeperiod.com
simplysouthdisinfecting.com
detectexperts.com
macdonald.delivery
fipcebpxx.icu
theworkswell.com
joinbharatpm.com
shjxyhwyxgstxxj.com
fishavia.com
metistattooshop.online
gamanafoods.com
rigidre.com
variablemonsters.com
lovingsunmarket.com
earnedblog.com
dravidaorganics.com
znycsb.com
11850shenandoahrd.com
jubalogisticstrace.com
lottohuayruay.com
resilienceready.events
thmyshoes.com
grabtabs123.com
dorispikesuite.xyz
deathdeclaration.guru
yensaokhanhhoatc.com
ryanwebinars.com
ilovelakshmi.com
autocreditmonteregie.com
bernina-ironing.com
modjun.com
elro-waf.com
biobeauty-ma.com
tomrings.com
showingrootsmovie.com
thebeautytales.com
rsmicwtrvv.net
cachorrospekines.com
theredwoodcoast.com
sq12348.com
4xhw.info
www-carinsurance.info
tripandfit.com
advancefinanc247.com
funwithchem.com
re-thinking-workplace.com
666sing.com
concaro.club
sayyestoauction.net
surtidoresenlinea.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2828-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2828-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2828-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2968-28-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1452 set thread context of 2828 1452 PO.20586829.exe 31 PID 2828 set thread context of 1204 2828 PO.20586829.exe 21 PID 2828 set thread context of 1204 2828 PO.20586829.exe 21 PID 2968 set thread context of 1204 2968 svchost.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.20586829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO.20586829.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2828 PO.20586829.exe 2828 PO.20586829.exe 2828 PO.20586829.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe 2968 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2828 PO.20586829.exe 2828 PO.20586829.exe 2828 PO.20586829.exe 2828 PO.20586829.exe 2968 svchost.exe 2968 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2828 PO.20586829.exe Token: SeDebugPrivilege 2968 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 1452 wrote to memory of 2828 1452 PO.20586829.exe 31 PID 2828 wrote to memory of 2968 2828 PO.20586829.exe 53 PID 2828 wrote to memory of 2968 2828 PO.20586829.exe 53 PID 2828 wrote to memory of 2968 2828 PO.20586829.exe 53 PID 2828 wrote to memory of 2968 2828 PO.20586829.exe 53 PID 2968 wrote to memory of 2576 2968 svchost.exe 54 PID 2968 wrote to memory of 2576 2968 svchost.exe 54 PID 2968 wrote to memory of 2576 2968 svchost.exe 54 PID 2968 wrote to memory of 2576 2968 svchost.exe 54
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\PO.20586829.exe"C:\Users\Admin\AppData\Local\Temp\PO.20586829.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\PO.20586829.exe"C:\Users\Admin\AppData\Local\Temp\PO.20586829.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO.20586829.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2576
-
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2964
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2980
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2952
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2612
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2344
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2764
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2756
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2704
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2892
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2588
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2584
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2604
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2620
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2648
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2664
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2712
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2136
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2324
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2640
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2440
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2112
-