Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240903-en
General
-
Target
Order.exe
-
Size
921KB
-
MD5
8a905323d959d7e727314c13d16814be
-
SHA1
4e6b591e34b901e87f03f722b2a1ebdf2716bc41
-
SHA256
0624c126123b489ae118f43fff0624fefb724eb3ab4399769e5fa695707fd318
-
SHA512
826251e2ad94095e860874452be326ce23d64fb3fdabd0b6c4260c3fdf8032c2588c3aab0034121a175afbd9c88fdafe9c3678f5ec456c8ac5974204372b56cd
-
SSDEEP
12288:Amxo9vZaGwNh5B7spJYmDY7tWJcOYZhHK7zWzKbojReF:Lxo9xav5BSJYmDYJMc/ZsoKboM
Malware Config
Extracted
xloader
2.3
m8ns
williegreensorganicfarm.com
bayoutacklecompany.com
shannonwritesblog.com
joygreat.net
bwin.sucks
sbn-kr.com
shoptucuda.com
happyshoppingzone.com
zhengtiankj.com
life-doula.com
huber-it.tech
goddessprotal.com
anchorportablestorage.com
newcoracle.com
lovelexboutique.com
lowcosttruckinginsurance.com
knets.info
infiniteclanofficial.com
gunny100.com
motorsportsequipment.com
decorurhome.com
copenhagenclimatedays.com
offshoreeastnc.com
dongsheng-spin.com
dancingwillowstable.com
sunshineassistedlivinghome.net
maisonnv.com
19tna.com
hollywoodlandtrash.com
theclawteam.com
hallmarkonlocation.com
droidcase.com
jesuslickingchrist.com
letusbuyyourtruck.net
homeembroiderymall.com
ofertasautosummitfordchile.com
sewpraypeaceful.club
zangorepublic.com
emailmayday.icu
respiratorconsulting.info
kenrisvisualartshop.com
silvereaglepartners.com
helmetmutant.life
caliest.com
cwjj.xyz
mariangelamata.com
cryptominebit.com
infinity-taxsolution.com
rajut.online
tucursodigitalvn.com
joyeeiioo.com
iregentos.info
foretoldapp.com
xn--2z1bq5xwrkehb7yi.com
thegeneraltruth.com
punjabfree.com
cancervaxx.com
dawtouch.com
bdxiguaimg.com
haberbozkurt.com
dutchstitchbrothers.com
xqhymy.com
transubstantiation.solar
j4mgtinc.com
itarready.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2716-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2716-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4092-23-0x0000000001100000-0x0000000001129000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1648 set thread context of 2716 1648 Order.exe 98 PID 2716 set thread context of 3464 2716 Order.exe 56 PID 4092 set thread context of 3464 4092 cscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2716 Order.exe 2716 Order.exe 2716 Order.exe 2716 Order.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe 4092 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2716 Order.exe 2716 Order.exe 2716 Order.exe 4092 cscript.exe 4092 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2716 Order.exe Token: SeDebugPrivilege 4092 cscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2716 1648 Order.exe 98 PID 1648 wrote to memory of 2716 1648 Order.exe 98 PID 1648 wrote to memory of 2716 1648 Order.exe 98 PID 1648 wrote to memory of 2716 1648 Order.exe 98 PID 1648 wrote to memory of 2716 1648 Order.exe 98 PID 1648 wrote to memory of 2716 1648 Order.exe 98 PID 3464 wrote to memory of 4092 3464 Explorer.EXE 99 PID 3464 wrote to memory of 4092 3464 Explorer.EXE 99 PID 3464 wrote to memory of 4092 3464 Explorer.EXE 99 PID 4092 wrote to memory of 4348 4092 cscript.exe 100 PID 4092 wrote to memory of 4348 4092 cscript.exe 100 PID 4092 wrote to memory of 4348 4092 cscript.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3464 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2716
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4092 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4348
-
-