Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:22
Static task
static1
Behavioral task
behavioral1
Sample
New Order.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
New Order.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
New Order.exe
-
Size
200KB
-
MD5
9b4f723dbb86d64168d8347abc60f232
-
SHA1
6bb06b4992e8212ad8eb82ef6dbe96039508680a
-
SHA256
688ac6f12f6c5e6342e8a357aa09f94a35000967c391c17d7264fca65098600a
-
SHA512
5330fbbe2312a6bfa050907cc1b67f00aefdf32cfb671c956fdea6411ac6623fa9352472d942c3f3eb9dddc3908ac4024908b0276e15df773835cc9828a769e2
-
SSDEEP
6144:QBlL/3Ym6NjZ1ZIRwHugFHe/HUiqcVMvTX:iVp6TfbOgF+ZDML
Malware Config
Extracted
xloader
2.3
iaop
fullcontrolsystems.com
shoptherevelle.com
strongpod.school
carthechconstruction.com
zaniherballife.com
pioneerlynn.com
37house.net
tuckahoeplantationlivestock.com
13053776999.com
aax1688.com
colonialservices.net
durango.xyz
bfncdn.com
gabrielgarnica.net
stilemilano.com
triportinc.com
shilparajan.com
singlebuck.com
learn2pmp.com
stgwxq.com
royalblueservers.com
famousbigdaddy.com
vaughanlawfl.com
salvadorroggero.com
kikoukou.com
glowforgewood.com
shopbabydiaper.com
dungouquan.com
leeds88.com
globalpartnerstv.com
ticketgateway.asia
js-yonghe.com
minhacasaverdeeamarela.com
fleralia.com
heringsdorf-ferienwohnungen.com
tongxinpos.com
autolabscopediagnostics.com
riches888pg.com
nickzaccaria.com
thetravel.review
julian-marc.com
casuallychicfurnishings.com
chillaxpools.com
elevatedtechs.vegas
keshmere.com
mapauseweb.com
baincot.com
yekolotemari.com
ziyuxxkj.xyz
jkrosedesign.com
theuniquerycollective.com
suafrisolac.com
upbeat3d.com
elevateathletix.com
theozkway.com
cdwct56.com
thediamanteffect.com
tillicumoutdoortheatre.com
rais5-hay5f.com
ruiyida.site
strength-sports.com
addonuts.com
vjkg.xyz
wallstreetbets.supply
passionwithpaint.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2756-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2756-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2808-21-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2660 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2776 New Order.exe 2776 New Order.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2776 set thread context of 2756 2776 New Order.exe 30 PID 2756 set thread context of 1188 2756 New Order.exe 21 PID 2808 set thread context of 1188 2808 control.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2756 New Order.exe 2756 New Order.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe 2808 control.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2776 New Order.exe 2756 New Order.exe 2756 New Order.exe 2756 New Order.exe 2808 control.exe 2808 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2756 New Order.exe Token: SeDebugPrivilege 2808 control.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2776 wrote to memory of 2756 2776 New Order.exe 30 PID 2776 wrote to memory of 2756 2776 New Order.exe 30 PID 2776 wrote to memory of 2756 2776 New Order.exe 30 PID 2776 wrote to memory of 2756 2776 New Order.exe 30 PID 2776 wrote to memory of 2756 2776 New Order.exe 30 PID 1188 wrote to memory of 2808 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2808 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2808 1188 Explorer.EXE 31 PID 1188 wrote to memory of 2808 1188 Explorer.EXE 31 PID 2808 wrote to memory of 2660 2808 control.exe 32 PID 2808 wrote to memory of 2660 2808 control.exe 32 PID 2808 wrote to memory of 2660 2808 control.exe 32 PID 2808 wrote to memory of 2660 2808 control.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\New Order.exe"C:\Users\Admin\AppData\Local\Temp\New Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New Order.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2660
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3