Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
Aviso de Pago pdf .exe
Resource
win7-20240729-en
General
-
Target
Aviso de Pago pdf .exe
-
Size
929KB
-
MD5
db085289795d7e9a90c5271efc2affd5
-
SHA1
c0e48a77cb314f0d12408aac6c189851d35e378d
-
SHA256
4a4480a59d046a261cf8b3b604d0c6cb87e54633aa784627643ea30ec3a63da4
-
SHA512
6811f2b59a62da00890dbc54351bc8d2464a66dd302bb047a5b80e51058acbed983177a18af0acfe483b3f49501a15d855003bdf14b05425cbe676727e8eae0b
-
SSDEEP
12288:yCOhcPUWRAhoubH9esjXXXsjSSRX00m2cdSkEtDNOwS0PE1c:yfcPU5L8Qnc1RRfzewSUIc
Malware Config
Extracted
xloader
2.3
uabu
khedutbajar.com
vehicleporn.com
misanthropedia.com
partum.life
tenshinstore.com
51tayi.com
rgr.one
lattakia-imbiss.com
escalerasdemetal.com
nationalurc.info
prettygalglam.com
globalperfumery.com
ivulam.xyz
qingniang.club
quick2ulube.com
curiget.xyz
ujeiakosdka.com
lacapitalcaferestaurant.com
agarkovsport.online
okashidonya.com
xiaoqiche.net
solothrone.com
anilfw.com
goindutch.com
buildaputt.com
salesenablementlaunch.com
olympicmeados.com
fastbetusa.com
lunaferro.com
realtimesoption.online
testci20200817122241.com
smitaaifoods.com
farmacyfastfood.com
hecmportal.net
24410restiveway.com
aaeonlineaccess.com
bigbuddyco.com
banismobarbersop.com
protectionguru.pro
almosting.com
perspectiveofgains.com
notebankers.com
southsidesportsmen.com
kopebitest.com
santiagosupermarket.com
cheap.kim
testjaycypes01.com
toyota-africa-starlet.com
sunsetplazaapts.com
favrrdrones.com
mayipay9.com
ahaal20.com
capitalsportscenter.com
betslotgames.com
thejewelcartel.com
gangubai-ramukaka.com
virtualmed101.com
sersali.com
oldschoolnews.net
sparta-mc.online
enisis.info
denversoccertraining.com
everythingkeema.com
assistancephotographe.com
aquaroyaume.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4072-8-0x0000000005290000-0x000000000529A000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2624-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2624-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1152-23-0x00000000006D0000-0x00000000006F9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4072 set thread context of 2624 4072 Aviso de Pago pdf .exe 91 PID 2624 set thread context of 3500 2624 Aviso de Pago pdf .exe 56 PID 1152 set thread context of 3500 1152 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Aviso de Pago pdf .exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 4072 Aviso de Pago pdf .exe 4072 Aviso de Pago pdf .exe 4072 Aviso de Pago pdf .exe 2624 Aviso de Pago pdf .exe 2624 Aviso de Pago pdf .exe 2624 Aviso de Pago pdf .exe 2624 Aviso de Pago pdf .exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe 1152 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2624 Aviso de Pago pdf .exe 2624 Aviso de Pago pdf .exe 2624 Aviso de Pago pdf .exe 1152 help.exe 1152 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4072 Aviso de Pago pdf .exe Token: SeDebugPrivilege 2624 Aviso de Pago pdf .exe Token: SeDebugPrivilege 1152 help.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4072 wrote to memory of 2624 4072 Aviso de Pago pdf .exe 91 PID 4072 wrote to memory of 2624 4072 Aviso de Pago pdf .exe 91 PID 4072 wrote to memory of 2624 4072 Aviso de Pago pdf .exe 91 PID 4072 wrote to memory of 2624 4072 Aviso de Pago pdf .exe 91 PID 4072 wrote to memory of 2624 4072 Aviso de Pago pdf .exe 91 PID 4072 wrote to memory of 2624 4072 Aviso de Pago pdf .exe 91 PID 3500 wrote to memory of 1152 3500 Explorer.EXE 92 PID 3500 wrote to memory of 1152 3500 Explorer.EXE 92 PID 3500 wrote to memory of 1152 3500 Explorer.EXE 92 PID 1152 wrote to memory of 1680 1152 help.exe 93 PID 1152 wrote to memory of 1680 1152 help.exe 93 PID 1152 wrote to memory of 1680 1152 help.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2624
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Aviso de Pago pdf .exe"3⤵
- System Location Discovery: System Language Discovery
PID:1680
-
-