Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
Aviso de Pago pdf .exe
Resource
win7-20240729-en
General
-
Target
Aviso de Pago pdf .exe
-
Size
929KB
-
MD5
db085289795d7e9a90c5271efc2affd5
-
SHA1
c0e48a77cb314f0d12408aac6c189851d35e378d
-
SHA256
4a4480a59d046a261cf8b3b604d0c6cb87e54633aa784627643ea30ec3a63da4
-
SHA512
6811f2b59a62da00890dbc54351bc8d2464a66dd302bb047a5b80e51058acbed983177a18af0acfe483b3f49501a15d855003bdf14b05425cbe676727e8eae0b
-
SSDEEP
12288:yCOhcPUWRAhoubH9esjXXXsjSSRX00m2cdSkEtDNOwS0PE1c:yfcPU5L8Qnc1RRfzewSUIc
Malware Config
Extracted
xloader
2.3
uabu
khedutbajar.com
vehicleporn.com
misanthropedia.com
partum.life
tenshinstore.com
51tayi.com
rgr.one
lattakia-imbiss.com
escalerasdemetal.com
nationalurc.info
prettygalglam.com
globalperfumery.com
ivulam.xyz
qingniang.club
quick2ulube.com
curiget.xyz
ujeiakosdka.com
lacapitalcaferestaurant.com
agarkovsport.online
okashidonya.com
xiaoqiche.net
solothrone.com
anilfw.com
goindutch.com
buildaputt.com
salesenablementlaunch.com
olympicmeados.com
fastbetusa.com
lunaferro.com
realtimesoption.online
testci20200817122241.com
smitaaifoods.com
farmacyfastfood.com
hecmportal.net
24410restiveway.com
aaeonlineaccess.com
bigbuddyco.com
banismobarbersop.com
protectionguru.pro
almosting.com
perspectiveofgains.com
notebankers.com
southsidesportsmen.com
kopebitest.com
santiagosupermarket.com
cheap.kim
testjaycypes01.com
toyota-africa-starlet.com
sunsetplazaapts.com
favrrdrones.com
mayipay9.com
ahaal20.com
capitalsportscenter.com
betslotgames.com
thejewelcartel.com
gangubai-ramukaka.com
virtualmed101.com
sersali.com
oldschoolnews.net
sparta-mc.online
enisis.info
denversoccertraining.com
everythingkeema.com
assistancephotographe.com
aquaroyaume.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2336-3-0x0000000000680000-0x000000000068A000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2084-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2084-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2900-25-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 3028 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2336 set thread context of 2084 2336 Aviso de Pago pdf .exe 30 PID 2084 set thread context of 1196 2084 Aviso de Pago pdf .exe 20 PID 2900 set thread context of 1196 2900 systray.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aviso de Pago pdf .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2336 Aviso de Pago pdf .exe 2336 Aviso de Pago pdf .exe 2084 Aviso de Pago pdf .exe 2084 Aviso de Pago pdf .exe 2900 systray.exe 2900 systray.exe 2900 systray.exe 2900 systray.exe 2900 systray.exe 2900 systray.exe 2900 systray.exe 2900 systray.exe 2900 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2084 Aviso de Pago pdf .exe 2084 Aviso de Pago pdf .exe 2084 Aviso de Pago pdf .exe 2900 systray.exe 2900 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2336 Aviso de Pago pdf .exe Token: SeDebugPrivilege 2084 Aviso de Pago pdf .exe Token: SeDebugPrivilege 2900 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 2336 wrote to memory of 2084 2336 Aviso de Pago pdf .exe 30 PID 1196 wrote to memory of 2900 1196 Explorer.EXE 31 PID 1196 wrote to memory of 2900 1196 Explorer.EXE 31 PID 1196 wrote to memory of 2900 1196 Explorer.EXE 31 PID 1196 wrote to memory of 2900 1196 Explorer.EXE 31 PID 2900 wrote to memory of 3028 2900 systray.exe 32 PID 2900 wrote to memory of 3028 2900 systray.exe 32 PID 2900 wrote to memory of 3028 2900 systray.exe 32 PID 2900 wrote to memory of 3028 2900 systray.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3028
-
-