Analysis
-
max time kernel
145s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
PO202104-114 - APQ Comercial Apoquindo,pdf.exe
Resource
win7-20240903-en
General
-
Target
PO202104-114 - APQ Comercial Apoquindo,pdf.exe
-
Size
423KB
-
MD5
80309b6c7c611963a2ef5578fddd687f
-
SHA1
701a364e7178949f69ef5d4592967d2c7a3a42e8
-
SHA256
f649fe26abc9b4c57926fb6a9e68d5064cb55930d0ed5a97c3b30d2a6b8e3fd3
-
SHA512
55e8c459b022559e181e18537b4690a8216f7782e6ac1f9fa2d342216baa145fba6ce03d6c18ddcb83da4666c2910034596d4bae40de86bb6fed3bc017ba4a00
-
SSDEEP
3072:4Dt0B56C+ME51H01tvNYQUj4XGKf1ZFZllkY7RBtm0tnoOsMVZI3zMrio/ihPEFp:450LW4/PhkNiozKwumk4ce12D2WGJ/
Malware Config
Extracted
xloader
2.5
b62n
childzplanet.com
nine8culture.com
yourfoodmenu.com
nxhxyzjy.com
nobelies.com
baetsupreme.net
indiadiscountedfares.com
iconnect-design.com
durston.store
sweetcreationsbyjp.com
ktieman.com
getvirtualaddress.com
cryptopoly-figures.com
minismi2.com
ricemoment.com
regionalhomescommercial.com
onelike.biz
d22.group
kwissleapp.com
cindyrandband.com
wolfgap.com
ilogic8.com
digitize-vision.com
qiunianns.com
tejpalmeet.com
joywalkerconsultingllc.com
daudcoffee.com
muktobangla.xyz
tendenciaofertas.com
xuongkhophoanghuong.pro
circleofdeth.com
spoilthemrottenpets.com
innasamudra.com
pizzadelta.com
jcmsomedia.com
applelost-support.info
ridvanyilmaz.com
catherinehaskins.com
fogelsingleywedding.com
suddennnnnnnnnnnn20.xyz
3leadsaday.xyz
xn--salihzzmrt-icb8ec.com
rdaniels2.com
xn--growbb-fvab.com
badkyker.quest
sdoook.com
bagways.com
bullseyefunrun.com
ff4c2myy0.xyz
stardustfuel.com
yiyuanpai.net
permaculturemd.com
prospectly.cloud
myonchain.art
atlasconcretos.com
ghost.immo
kondanginyuk.online
mohamedtaher.xyz
sxsxnt.com
sofiarust.xyz
playmayka.com
eemtyx.com
tashamurphy.com
akoya-kyoto.com
multidetoxhepatico.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2724-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2724-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2736-17-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1968 set thread context of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 2724 set thread context of 1244 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 21 PID 2736 set thread context of 1244 2736 wininit.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO202104-114 - APQ Comercial Apoquindo,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wininit.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe 2736 wininit.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2736 wininit.exe 2736 wininit.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe Token: SeDebugPrivilege 2724 PO202104-114 - APQ Comercial Apoquindo,pdf.exe Token: SeDebugPrivilege 2736 wininit.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1968 wrote to memory of 2724 1968 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 31 PID 1244 wrote to memory of 2736 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2736 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2736 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2736 1244 Explorer.EXE 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
-
C:\Windows\SysWOW64\wininit.exe"C:\Windows\SysWOW64\wininit.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2736
-