Analysis
-
max time kernel
148s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240903-en
General
-
Target
Order.exe
-
Size
921KB
-
MD5
8a905323d959d7e727314c13d16814be
-
SHA1
4e6b591e34b901e87f03f722b2a1ebdf2716bc41
-
SHA256
0624c126123b489ae118f43fff0624fefb724eb3ab4399769e5fa695707fd318
-
SHA512
826251e2ad94095e860874452be326ce23d64fb3fdabd0b6c4260c3fdf8032c2588c3aab0034121a175afbd9c88fdafe9c3678f5ec456c8ac5974204372b56cd
-
SSDEEP
12288:Amxo9vZaGwNh5B7spJYmDY7tWJcOYZhHK7zWzKbojReF:Lxo9xav5BSJYmDYJMc/ZsoKboM
Malware Config
Extracted
xloader
2.3
m8ns
williegreensorganicfarm.com
bayoutacklecompany.com
shannonwritesblog.com
joygreat.net
bwin.sucks
sbn-kr.com
shoptucuda.com
happyshoppingzone.com
zhengtiankj.com
life-doula.com
huber-it.tech
goddessprotal.com
anchorportablestorage.com
newcoracle.com
lovelexboutique.com
lowcosttruckinginsurance.com
knets.info
infiniteclanofficial.com
gunny100.com
motorsportsequipment.com
decorurhome.com
copenhagenclimatedays.com
offshoreeastnc.com
dongsheng-spin.com
dancingwillowstable.com
sunshineassistedlivinghome.net
maisonnv.com
19tna.com
hollywoodlandtrash.com
theclawteam.com
hallmarkonlocation.com
droidcase.com
jesuslickingchrist.com
letusbuyyourtruck.net
homeembroiderymall.com
ofertasautosummitfordchile.com
sewpraypeaceful.club
zangorepublic.com
emailmayday.icu
respiratorconsulting.info
kenrisvisualartshop.com
silvereaglepartners.com
helmetmutant.life
caliest.com
cwjj.xyz
mariangelamata.com
cryptominebit.com
infinity-taxsolution.com
rajut.online
tucursodigitalvn.com
joyeeiioo.com
iregentos.info
foretoldapp.com
xn--2z1bq5xwrkehb7yi.com
thegeneraltruth.com
punjabfree.com
cancervaxx.com
dawtouch.com
bdxiguaimg.com
haberbozkurt.com
dutchstitchbrothers.com
xqhymy.com
transubstantiation.solar
j4mgtinc.com
itarready.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2668-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2668-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2668-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2588-27-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2576 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1636 set thread context of 2668 1636 Order.exe 31 PID 2668 set thread context of 1208 2668 Order.exe 21 PID 2668 set thread context of 1208 2668 Order.exe 21 PID 2588 set thread context of 1208 2588 NETSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2588 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2668 Order.exe 2668 Order.exe 2668 Order.exe 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE 2588 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2668 Order.exe 2668 Order.exe 2668 Order.exe 2668 Order.exe 2588 NETSTAT.EXE 2588 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2668 Order.exe Token: SeDebugPrivilege 2588 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1636 wrote to memory of 2668 1636 Order.exe 31 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 32 PID 1208 wrote to memory of 2588 1208 Explorer.EXE 32 PID 2588 wrote to memory of 2576 2588 NETSTAT.EXE 33 PID 2588 wrote to memory of 2576 2588 NETSTAT.EXE 33 PID 2588 wrote to memory of 2576 2588 NETSTAT.EXE 33 PID 2588 wrote to memory of 2576 2588 NETSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2576
-
-