Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
factura y factura de la v_a a_rea.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
factura y factura de la v_a a_rea.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
factura y factura de la v_a a_rea.exe
-
Size
263KB
-
MD5
8fc1c5f9214f753eda98e00acc7250d1
-
SHA1
6b1e3b3869227c48aaa4eed2b33505e934f6e890
-
SHA256
006ce9ab63f0b937fb3966829cbdd801d67c5b0f2b17db3d2f176eee508128ee
-
SHA512
9ed9a86f5c3b6af00643182fb902ceb523c5d9f20f370efa8f408c5fe114eddaf1f85c79334a8482a65ee9f55ef5d9829cb21935476fa70c60671b575725a64c
-
SSDEEP
6144:LTqjFeDgN8/bznxiHSRktaCMC4+Bk/R2lqfDELL:/ZgY/XKx4MVljH
Malware Config
Extracted
xloader
2.3
s4h4
v65mwh.com
ofertasempresariais.com
apoteklowamedika.com
shopblvdhair.com
jtcameraftp.com
vimlark.com
wamodo.com
mistersvisuals.com
copterapps.com
jamesebraxton.com
darmarcasepatentes.com
texasroofrepairpros.com
okaycollective.net
rughouzz.com
dgzhileng.com
markstipsandtoes.com
globalgrowlights.com
thehustleandco.com
fdgrenewables.com
sweetsells.com
rumunia.email
money-best.com
screentestcanada.com
bonap56.com
zxlongfa.com
makembed.com
antoniasafrica.com
rokteq.com
adimascollection.com
shopskinfactory.com
8kmjfd.com
weinsurerealty.com
mybvvspace.com
beachhousemotelnj.com
icloudtrace.com
littlefarmdreams.com
imageoftheunseen.com
veganoptimism.com
insureunitlink.com
englishonline.onl
idbma.net
dietov-shop.online
nmunitedtiles.com
kultivatemusicmanagement.net
unemploymantpua.com
thepcsolver.com
dailybreadandlivingwater.com
syboyi.com
catsanddogs.agency
thantai123.com
galatasourcing.com
cibeles.one
goldenkitchenfelling.com
angelsangelicamarmalade.com
tusam.digital
sm-dies.com
retrainaustralia.com
davidchurcherphotography.com
texasdivorcepro.com
rongshengsh.com
immobilienmentoring.com
fallguysmibile.com
xn--anahtarcm-2pb.com
hecmasolutions.com
hopelessvisonary.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2984-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2984-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2340-21-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2704 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2104 factura y factura de la v_a a_rea.exe 2104 factura y factura de la v_a a_rea.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2104 set thread context of 2984 2104 factura y factura de la v_a a_rea.exe 30 PID 2984 set thread context of 1192 2984 factura y factura de la v_a a_rea.exe 21 PID 2340 set thread context of 1192 2340 svchost.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language factura y factura de la v_a a_rea.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2984 factura y factura de la v_a a_rea.exe 2984 factura y factura de la v_a a_rea.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe 2340 svchost.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2104 factura y factura de la v_a a_rea.exe 2984 factura y factura de la v_a a_rea.exe 2984 factura y factura de la v_a a_rea.exe 2984 factura y factura de la v_a a_rea.exe 2340 svchost.exe 2340 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2984 factura y factura de la v_a a_rea.exe Token: SeDebugPrivilege 2340 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2104 wrote to memory of 2984 2104 factura y factura de la v_a a_rea.exe 30 PID 2104 wrote to memory of 2984 2104 factura y factura de la v_a a_rea.exe 30 PID 2104 wrote to memory of 2984 2104 factura y factura de la v_a a_rea.exe 30 PID 2104 wrote to memory of 2984 2104 factura y factura de la v_a a_rea.exe 30 PID 2104 wrote to memory of 2984 2104 factura y factura de la v_a a_rea.exe 30 PID 1192 wrote to memory of 2340 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2340 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2340 1192 Explorer.EXE 31 PID 1192 wrote to memory of 2340 1192 Explorer.EXE 31 PID 2340 wrote to memory of 2704 2340 svchost.exe 33 PID 2340 wrote to memory of 2704 2340 svchost.exe 33 PID 2340 wrote to memory of 2704 2340 svchost.exe 33 PID 2340 wrote to memory of 2704 2340 svchost.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2984
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2704
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3