Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
ATI-Export quotation N° 34715383 pdf.exe
Resource
win7-20240903-en
General
-
Target
ATI-Export quotation N° 34715383 pdf.exe
-
Size
1.1MB
-
MD5
e74bcdece9272b7fb4e58352e373346d
-
SHA1
641a895c5b4effed05dd7e5e266376caca5e8be2
-
SHA256
7e2ec60952ce4d8fee2442f5705afb8405d94cef6b194f6013a262de5247635a
-
SHA512
154f38f0d78ade046c03bbff893e30c68bdcf703e20a21bf867e5165b4278b0010f8585622cdc1358f73ff8245d1d2a34322d13855dbd17fd97eb1cdd9677ade
-
SSDEEP
24576:6o44GE0BvNbkLOSiyRRRRR6gvqITpT0j4yirCFzfo:vLCwRRRRR6Vy10j4y1Zf
Malware Config
Extracted
xloader
2.3
uabu
khedutbajar.com
vehicleporn.com
misanthropedia.com
partum.life
tenshinstore.com
51tayi.com
rgr.one
lattakia-imbiss.com
escalerasdemetal.com
nationalurc.info
prettygalglam.com
globalperfumery.com
ivulam.xyz
qingniang.club
quick2ulube.com
curiget.xyz
ujeiakosdka.com
lacapitalcaferestaurant.com
agarkovsport.online
okashidonya.com
xiaoqiche.net
solothrone.com
anilfw.com
goindutch.com
buildaputt.com
salesenablementlaunch.com
olympicmeados.com
fastbetusa.com
lunaferro.com
realtimesoption.online
testci20200817122241.com
smitaaifoods.com
farmacyfastfood.com
hecmportal.net
24410restiveway.com
aaeonlineaccess.com
bigbuddyco.com
banismobarbersop.com
protectionguru.pro
almosting.com
perspectiveofgains.com
notebankers.com
southsidesportsmen.com
kopebitest.com
santiagosupermarket.com
cheap.kim
testjaycypes01.com
toyota-africa-starlet.com
sunsetplazaapts.com
favrrdrones.com
mayipay9.com
ahaal20.com
capitalsportscenter.com
betslotgames.com
thejewelcartel.com
gangubai-ramukaka.com
virtualmed101.com
sersali.com
oldschoolnews.net
sparta-mc.online
enisis.info
denversoccertraining.com
everythingkeema.com
assistancephotographe.com
aquaroyaume.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3928-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3928-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2208-23-0x00000000002F0000-0x0000000000319000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3116 set thread context of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3928 set thread context of 3464 3928 ATI-Export quotation N° 34715383 pdf.exe 56 PID 2208 set thread context of 3464 2208 systray.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ATI-Export quotation N° 34715383 pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3116 ATI-Export quotation N° 34715383 pdf.exe 3116 ATI-Export quotation N° 34715383 pdf.exe 3116 ATI-Export quotation N° 34715383 pdf.exe 3116 ATI-Export quotation N° 34715383 pdf.exe 3116 ATI-Export quotation N° 34715383 pdf.exe 3928 ATI-Export quotation N° 34715383 pdf.exe 3928 ATI-Export quotation N° 34715383 pdf.exe 3928 ATI-Export quotation N° 34715383 pdf.exe 3928 ATI-Export quotation N° 34715383 pdf.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe 2208 systray.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3928 ATI-Export quotation N° 34715383 pdf.exe 3928 ATI-Export quotation N° 34715383 pdf.exe 3928 ATI-Export quotation N° 34715383 pdf.exe 2208 systray.exe 2208 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3116 ATI-Export quotation N° 34715383 pdf.exe Token: SeDebugPrivilege 3928 ATI-Export quotation N° 34715383 pdf.exe Token: SeDebugPrivilege 2208 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3116 wrote to memory of 2628 3116 ATI-Export quotation N° 34715383 pdf.exe 100 PID 3116 wrote to memory of 2628 3116 ATI-Export quotation N° 34715383 pdf.exe 100 PID 3116 wrote to memory of 2628 3116 ATI-Export quotation N° 34715383 pdf.exe 100 PID 3116 wrote to memory of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3116 wrote to memory of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3116 wrote to memory of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3116 wrote to memory of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3116 wrote to memory of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3116 wrote to memory of 3928 3116 ATI-Export quotation N° 34715383 pdf.exe 101 PID 3464 wrote to memory of 2208 3464 Explorer.EXE 104 PID 3464 wrote to memory of 2208 3464 Explorer.EXE 104 PID 3464 wrote to memory of 2208 3464 Explorer.EXE 104 PID 2208 wrote to memory of 4348 2208 systray.exe 105 PID 2208 wrote to memory of 4348 2208 systray.exe 105 PID 2208 wrote to memory of 4348 2208 systray.exe 105
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"3⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3928
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:1584
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3540
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\ATI-Export quotation N° 34715383 pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-