Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:51
Static task
static1
Behavioral task
behavioral1
Sample
PO_006614.doc.exe
Resource
win7-20240903-en
General
-
Target
PO_006614.doc.exe
-
Size
1.3MB
-
MD5
07e55585280a090c5be065456bd3eaed
-
SHA1
142c3b752b1791b6d8eb7b8fb78f36773a51d808
-
SHA256
428e45ab1e675cd53981edd68a9d7989a78b267e069a8ce64415c5788c012212
-
SHA512
b9a8cde0da7a47f7242bf26f45a54820520b2469534caff639313a05a837ff16bdea1d206765a622c10cf5dc740c3be5107dd4bc2b6d1bd6f17aba007f90de87
-
SSDEEP
24576:RIjY+bAaMd3REebAaMd33zBNxFUVpkmkFFogHBa8+Gefg/kz:O5AaMVRE2AaMV3zBCLAFoOBa8+Gefg
Malware Config
Extracted
xloader
2.3
rbg8
youschrutedit.com
ashvarapps.com
lover4fun.com
xn--hvsa952mrp8a.com
gentryrewards.com
musfly.info
greatexpectationssouthshore.com
thebluecreators.com
chargementale.com
construirsanidade.com
asiannics.icu
cacchaweb.xyz
retailfully.com
mktdigitalplus.com
ohiohemorrhoidcenter.com
tzbwgc.com
representmasks.com
integratedpsychedelics.net
okrvsale.com
cashflowplatformblueprint.com
gridrop.com
paradiselivingdr.com
huataihbkj.com
hemp-ceus.com
baincot.com
wholesaleperennialnursery.com
avrez.xyz
setiis.group
inmotionfitnessacademy.com
birdy-beauty.com
sheeblingz.com
nokap99.com
rightvehicles4u.com
indiapressrelease.online
xn--qpr83at9ccyf9y6dksya.site
brownformanbeverageslimited.com
viworldwide.com
usrealtimerates.com
dallashometourmedia.com
quickbooksmallbusiness.com
9529914.com
dewaporn.com
thefaceoftechnology.com
telega1.website
pedefagy.com
getstackedlabs.com
transparentcomfortable.com
daniellereneedesigns.com
sweetmissy.net
unagitated.com
tuoposicion.online
thiswiththem.com
protectiontees.net
travelingnest.com
gravyfy.com
richangermiller.com
otmlords.com
spayke.com
legicul.com
tryvirtualgym.com
burges-sahagun.com
uspetz.com
theartistrymind.com
sunworldacademy.com
bergheimmeatmarket.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2872-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2872-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2748-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2624 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3000 set thread context of 2872 3000 PO_006614.doc.exe 31 PID 2872 set thread context of 1196 2872 PO_006614.doc.exe 21 PID 2748 set thread context of 1196 2748 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PO_006614.doc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 20 IoCs
pid Process 2872 PO_006614.doc.exe 2872 PO_006614.doc.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe 2748 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2872 PO_006614.doc.exe 2872 PO_006614.doc.exe 2872 PO_006614.doc.exe 2748 chkdsk.exe 2748 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2872 PO_006614.doc.exe Token: SeDebugPrivilege 2748 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 3000 wrote to memory of 2872 3000 PO_006614.doc.exe 31 PID 1196 wrote to memory of 2748 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2748 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2748 1196 Explorer.EXE 32 PID 1196 wrote to memory of 2748 1196 Explorer.EXE 32 PID 2748 wrote to memory of 2624 2748 chkdsk.exe 33 PID 2748 wrote to memory of 2624 2748 chkdsk.exe 33 PID 2748 wrote to memory of 2624 2748 chkdsk.exe 33 PID 2748 wrote to memory of 2624 2748 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2624
-
-