Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
PO202104-114 - APQ Comercial Apoquindo,pdf.exe
Resource
win7-20240903-en
General
-
Target
PO202104-114 - APQ Comercial Apoquindo,pdf.exe
-
Size
423KB
-
MD5
80309b6c7c611963a2ef5578fddd687f
-
SHA1
701a364e7178949f69ef5d4592967d2c7a3a42e8
-
SHA256
f649fe26abc9b4c57926fb6a9e68d5064cb55930d0ed5a97c3b30d2a6b8e3fd3
-
SHA512
55e8c459b022559e181e18537b4690a8216f7782e6ac1f9fa2d342216baa145fba6ce03d6c18ddcb83da4666c2910034596d4bae40de86bb6fed3bc017ba4a00
-
SSDEEP
3072:4Dt0B56C+ME51H01tvNYQUj4XGKf1ZFZllkY7RBtm0tnoOsMVZI3zMrio/ihPEFp:450LW4/PhkNiozKwumk4ce12D2WGJ/
Malware Config
Extracted
xloader
2.5
b62n
childzplanet.com
nine8culture.com
yourfoodmenu.com
nxhxyzjy.com
nobelies.com
baetsupreme.net
indiadiscountedfares.com
iconnect-design.com
durston.store
sweetcreationsbyjp.com
ktieman.com
getvirtualaddress.com
cryptopoly-figures.com
minismi2.com
ricemoment.com
regionalhomescommercial.com
onelike.biz
d22.group
kwissleapp.com
cindyrandband.com
wolfgap.com
ilogic8.com
digitize-vision.com
qiunianns.com
tejpalmeet.com
joywalkerconsultingllc.com
daudcoffee.com
muktobangla.xyz
tendenciaofertas.com
xuongkhophoanghuong.pro
circleofdeth.com
spoilthemrottenpets.com
innasamudra.com
pizzadelta.com
jcmsomedia.com
applelost-support.info
ridvanyilmaz.com
catherinehaskins.com
fogelsingleywedding.com
suddennnnnnnnnnnn20.xyz
3leadsaday.xyz
xn--salihzzmrt-icb8ec.com
rdaniels2.com
xn--growbb-fvab.com
badkyker.quest
sdoook.com
bagways.com
bullseyefunrun.com
ff4c2myy0.xyz
stardustfuel.com
yiyuanpai.net
permaculturemd.com
prospectly.cloud
myonchain.art
atlasconcretos.com
ghost.immo
kondanginyuk.online
mohamedtaher.xyz
sxsxnt.com
sofiarust.xyz
playmayka.com
eemtyx.com
tashamurphy.com
akoya-kyoto.com
multidetoxhepatico.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2524-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2524-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1736-17-0x0000000000160000-0x0000000000189000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1448 set thread context of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 2524 set thread context of 3444 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 56 PID 1736 set thread context of 3444 1736 cmmon32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO202104-114 - APQ Comercial Apoquindo,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe 1736 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 1736 cmmon32.exe 1736 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe Token: SeDebugPrivilege 2524 PO202104-114 - APQ Comercial Apoquindo,pdf.exe Token: SeDebugPrivilege 1736 cmmon32.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1448 wrote to memory of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 1448 wrote to memory of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 1448 wrote to memory of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 1448 wrote to memory of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 1448 wrote to memory of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 1448 wrote to memory of 2524 1448 PO202104-114 - APQ Comercial Apoquindo,pdf.exe 90 PID 3444 wrote to memory of 1736 3444 Explorer.EXE 91 PID 3444 wrote to memory of 1736 3444 Explorer.EXE 91 PID 3444 wrote to memory of 1736 3444 Explorer.EXE 91
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO202104-114 - APQ Comercial Apoquindo,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1736
-