Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
0rder-bcm_23062021.exe
Resource
win7-20241023-en
General
-
Target
0rder-bcm_23062021.exe
-
Size
1.3MB
-
MD5
be367a26f8caea0b21c3d23734fe926d
-
SHA1
7c64a083dc814e69fe472edbe3d87c74310a9ef8
-
SHA256
19502ad02119f2e62cd3a35bfb9ceda6be0e5767a078609631dca9091f9ecde6
-
SHA512
1dff8942de1ee220568a4f1ae2eebfa5b9de27fdbc4bc47460b2ba28dc8e3ec3ab55077e6fa549295ebbe3940889626264649eda761e3d879031d89340ce95e1
-
SSDEEP
24576:1KoBEm9pX4MSVHgIVxTEK+Qwsnd51RV1XPm5X0/fqrrCgPM2S8cAt8jipgXGdk:QjCX4M2pVFwq5bV1fm5C4CgPMu8jipg/
Malware Config
Extracted
xloader
2.3
uqf5
paolograssino.com
hammockcoastproperty.net
blinbins.com
financierapoorvenirsas.com
mattruddle.com
wighumanhair.com
tvdajiang14.com
theblackharvest.com
tylerrucarean.com
a-prime-india-demataccount.zone
amboselisafarigallery.info
toolbnbapp.com
scientificindustrial.com
trainup-wall.com
pocosmo.com
thebluepottingtable.com
leavelogs.com
verbalfreedom.com
qa4i.com
kiiikoo.com
glossedbythebrat.com
gorditasdemaiz.com
healthystartswithin.com
homeanddesignstudio.com
skalewide.com
bestdispatchtowitnesstoday.info
cineconhisense.com
mahibhardwaj.com
imperatrizacam.com
bezoekburen.com
qbakan.com
ansalapishagunrealestate.com
crow94723.com
kosova.one
chhhju.com
cominghomestead.com
ingenious.care
unclesamsoftware.com
xn--cfe12fhb.com
tradinglantern.com
wwwthedrudgereport.com
researchinnovations.net
to-cs.com
sandia.info
tachibana-fukushima.com
pzzfw.com
flockuplabs.com
stays.travel
itertempora.net
murrietayoga.com
plus5tocrafting.com
ovidrelprefilledsyringe.com
prltoday.com
l24consultants.net
mexicobeachselfstorage.com
bnvjufj.icu
schulze.media
thewinebarrel.info
blesst.tech
newtec.life
acmarketinghacks.com
elitevillaholidays.com
pr-daily.com
cgjanvier.com
culturalinterface.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2904-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2904-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2912-24-0x0000000000110000-0x0000000000139000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 108 set thread context of 2904 108 0rder-bcm_23062021.exe 31 PID 2904 set thread context of 1188 2904 RegSvcs.exe 21 PID 2912 set thread context of 1188 2912 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0rder-bcm_23062021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 108 0rder-bcm_23062021.exe 108 0rder-bcm_23062021.exe 108 0rder-bcm_23062021.exe 108 0rder-bcm_23062021.exe 2904 RegSvcs.exe 2904 RegSvcs.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe 2912 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2904 RegSvcs.exe 2904 RegSvcs.exe 2904 RegSvcs.exe 2912 cmstp.exe 2912 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 108 0rder-bcm_23062021.exe Token: SeDebugPrivilege 2904 RegSvcs.exe Token: SeDebugPrivilege 2912 cmstp.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 108 wrote to memory of 2904 108 0rder-bcm_23062021.exe 31 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2912 1188 Explorer.EXE 32 PID 2912 wrote to memory of 2692 2912 cmstp.exe 33 PID 2912 wrote to memory of 2692 2912 cmstp.exe 33 PID 2912 wrote to memory of 2692 2912 cmstp.exe 33 PID 2912 wrote to memory of 2692 2912 cmstp.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\0rder-bcm_23062021.exe"C:\Users\Admin\AppData\Local\Temp\0rder-bcm_23062021.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2904
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2692
-
-