Analysis
-
max time kernel
146s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
ComparisonComparer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
ComparisonComparer.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
po.exe
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
po.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
poo.exe
Resource
win7-20240903-en
General
-
Target
po.exe
-
Size
968KB
-
MD5
7c8206e11a3f0a3832c65ee22ca21819
-
SHA1
fb255b2ee75cc76180daddb78c7cf912eb248f06
-
SHA256
f8cdb91e57d80dd935b4490720b39d75db0443fac602c9d4cdab434aa82a6a43
-
SHA512
b230d0ebeddb1641a2f63286b8d90d7f7d83b03f5cec4d7433e8463dc22796c9bf657bb487ab7f57221173cd42721b27289dc2e7f8f9817fcd3f6a6968c5bca2
-
SSDEEP
24576:AyCb02+HEYq7j15AD9UvCVPA/012j1DkdZ:px3HZqdcUS2Jkd
Malware Config
Extracted
xloader
2.3
i9me
claimbrosprospecting.com
visionnaire.design
russmatsuo.com
phpower.com
themaitregroup.net
perderson.space
signaturewallcoverings.com
mesharifoundation.com
mastjio.com
ngstarshub.com
teamsdialpad.com
handysyed.com
basalgoods.company
miniletics.com
reidasmaquinasdolitoral.com
signsgadsden.com
huigukeji.net
yesonmeasurez.com
rwingbistro.com
xn--90aoahqe0a0f.xn--p1acf
sapojm.com
c-ou.com
constructionpro.online
evidenceofglory.com
ingenuwitty.com
windyhillneighborhood.com
polygraphok.com
adrianschmidt.info
jr-114.com
muslimbookclub.com
messi-and-ronaldo.com
ncstake.com
applelaptopservice.center
barkinlot.com
pjshr.com
consultphysicians.com
sonderhomehealth.com
clockworkhomeserviceslv.com
sendnownow.com
travelcampaigner.com
wordshirts.store
bellasolsalon.com
sachach.com
acme-ecomm-corp.com
joshuadawsonart.com
cowgirlways.com
folkfameb.com
panakha.com
nekum.com
space2sell.net
the8thmajor.com
dlta22.com
contorig2.com
rixso-holding.com
tropicalchasers.com
citestaccnt1597664033.com
loud.cool
slotomaniavp.com
southpawgymfranchise.com
lifewithhippo.com
counselorchristy.com
emmaluukkonen.com
delreyvending.com
thepoocheparlor.com
happynrg.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral4/memory/876-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral4/memory/876-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral4/memory/1840-23-0x0000000000800000-0x0000000000828000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
po.exepo.exewscript.exedescription pid process target process PID 3252 set thread context of 876 3252 po.exe po.exe PID 876 set thread context of 3428 876 po.exe Explorer.EXE PID 1840 set thread context of 3428 1840 wscript.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
po.exewscript.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language po.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
Processes:
po.exepo.exewscript.exepid process 3252 po.exe 3252 po.exe 3252 po.exe 3252 po.exe 3252 po.exe 3252 po.exe 3252 po.exe 876 po.exe 876 po.exe 876 po.exe 876 po.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe 1840 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
po.exewscript.exepid process 876 po.exe 876 po.exe 876 po.exe 1840 wscript.exe 1840 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
po.exepo.exewscript.exedescription pid process Token: SeDebugPrivilege 3252 po.exe Token: SeDebugPrivilege 876 po.exe Token: SeDebugPrivilege 1840 wscript.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
po.exeExplorer.EXEwscript.exedescription pid process target process PID 3252 wrote to memory of 5072 3252 po.exe po.exe PID 3252 wrote to memory of 5072 3252 po.exe po.exe PID 3252 wrote to memory of 5072 3252 po.exe po.exe PID 3252 wrote to memory of 3024 3252 po.exe po.exe PID 3252 wrote to memory of 3024 3252 po.exe po.exe PID 3252 wrote to memory of 3024 3252 po.exe po.exe PID 3252 wrote to memory of 876 3252 po.exe po.exe PID 3252 wrote to memory of 876 3252 po.exe po.exe PID 3252 wrote to memory of 876 3252 po.exe po.exe PID 3252 wrote to memory of 876 3252 po.exe po.exe PID 3252 wrote to memory of 876 3252 po.exe po.exe PID 3252 wrote to memory of 876 3252 po.exe po.exe PID 3428 wrote to memory of 1840 3428 Explorer.EXE wscript.exe PID 3428 wrote to memory of 1840 3428 Explorer.EXE wscript.exe PID 3428 wrote to memory of 1840 3428 Explorer.EXE wscript.exe PID 1840 wrote to memory of 4352 1840 wscript.exe cmd.exe PID 1840 wrote to memory of 4352 1840 wscript.exe cmd.exe PID 1840 wrote to memory of 4352 1840 wscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3252 -
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"3⤵PID:5072
-
-
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"3⤵PID:3024
-
-
C:\Users\Admin\AppData\Local\Temp\po.exe"C:\Users\Admin\AppData\Local\Temp\po.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:876
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1840 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\po.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4352
-
-