Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:23
Static task
static1
Behavioral task
behavioral1
Sample
PO#500128171.pdf.exe
Resource
win7-20241010-en
General
-
Target
PO#500128171.pdf.exe
-
Size
957KB
-
MD5
81f8d0aa5bea6f02e0e3a9db5d88e6f0
-
SHA1
f36ca5bd3305f8ea84027b4bb296bf7d31fe3bc8
-
SHA256
55db60686c041795bbf307bf11f568774c483764987870c35fa09a7a34ec3333
-
SHA512
f04b3385e14bb1565892d4c8bf64ecd884c37a51adf0e516820e4dc782939762905e37a6e8387fca818076861713da398a45d5b5414b0e34a84042872d19356e
-
SSDEEP
24576:qr+MOQW87bhQxtVUyonohbwkkUVkKxelbsLRQgYz:a+rQQxtVUyDphxB9+
Malware Config
Extracted
xloader
2.3
gire
chicagocbdtinctures.com
ambedkarvision.com
abrosnm3.com
whitrhatjr.com
teachmevirtually.com
slightedgeadvertisement.com
16fortherstatka.com
ankerjunge.com
woodslabkl.com
xn--grupodoaarepa-okb.com
hiraodai-kiroukai.com
lessixsoeurs.com
meetmycopartner.com
b-equip.com
bestwisdomteethdoc.net
uaspics.com
therutlanddentalgroup.com
gybhn.com
shaffershotsphotography.com
e13bythehive.com
5amuban.site
bluffcityfunds.com
rosascleaningpros.com
incakori.com
1tribedance.com
dongycotruyenn.club
xn--on3b25q2e.com
crazyhindiblog.com
govietcaocap3t.com
isla.fyi
luma-luxury-matchmakers.com
newzbuz.com
galataauction.com
semanticzone.net
shopwebgiare.com
intracon.tech
swmcustom.com
truebluecleaningsolution.com
getlashedbytori.com
doragonzales.com
khiethaudanchinhhang.website
thedivakids.com
ipimseminars.com
thesexymuumuu.com
kpfasafetynet.com
flatcreekmediagroup.com
ihzasv.com
dkconstructionusa.com
aozra-kai.net
mobius-co.xyz
scienceinprogress.com
vanamericana.com
nexterslab.com
theworldisterrifying.com
evforelectricvehicle.com
shalynmusic.com
autoinsgenius.com
patientsempowered.net
burgessmeredithmusic.com
zhaozifei.com
schonweitz.com
normboxe.com
heideng.design
rgtechsystems.com
woyulu.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/5620-2488-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/5620-2492-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/5620-2496-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1100 set thread context of 5620 1100 PO#500128171.pdf.exe 92 PID 5620 set thread context of 3516 5620 PO#500128171.pdf.exe 56 PID 5620 set thread context of 3516 5620 PO#500128171.pdf.exe 56 PID 5136 set thread context of 3516 5136 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO#500128171.pdf.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 1100 PO#500128171.pdf.exe 1100 PO#500128171.pdf.exe 1100 PO#500128171.pdf.exe 1100 PO#500128171.pdf.exe 1100 PO#500128171.pdf.exe 1100 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe 5136 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5620 PO#500128171.pdf.exe 5136 cmd.exe 5136 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1100 PO#500128171.pdf.exe Token: SeDebugPrivilege 5620 PO#500128171.pdf.exe Token: SeDebugPrivilege 5136 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1100 wrote to memory of 5572 1100 PO#500128171.pdf.exe 91 PID 1100 wrote to memory of 5572 1100 PO#500128171.pdf.exe 91 PID 1100 wrote to memory of 5572 1100 PO#500128171.pdf.exe 91 PID 1100 wrote to memory of 5620 1100 PO#500128171.pdf.exe 92 PID 1100 wrote to memory of 5620 1100 PO#500128171.pdf.exe 92 PID 1100 wrote to memory of 5620 1100 PO#500128171.pdf.exe 92 PID 1100 wrote to memory of 5620 1100 PO#500128171.pdf.exe 92 PID 1100 wrote to memory of 5620 1100 PO#500128171.pdf.exe 92 PID 1100 wrote to memory of 5620 1100 PO#500128171.pdf.exe 92 PID 3516 wrote to memory of 5136 3516 Explorer.EXE 93 PID 3516 wrote to memory of 5136 3516 Explorer.EXE 93 PID 3516 wrote to memory of 5136 3516 Explorer.EXE 93 PID 5136 wrote to memory of 5352 5136 cmd.exe 94 PID 5136 wrote to memory of 5352 5136 cmd.exe 94 PID 5136 wrote to memory of 5352 5136 cmd.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3516 -
C:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exeC:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exe ftyyhgtt3⤵PID:5572
-
-
C:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exeC:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exe ftyyhgtt3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5620
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:5136 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO#500128171.pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5352
-
-