Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:52
Static task
static1
Behavioral task
behavioral1
Sample
0rder-bcm_23062021.exe
Resource
win7-20241023-en
General
-
Target
0rder-bcm_23062021.exe
-
Size
1.3MB
-
MD5
be367a26f8caea0b21c3d23734fe926d
-
SHA1
7c64a083dc814e69fe472edbe3d87c74310a9ef8
-
SHA256
19502ad02119f2e62cd3a35bfb9ceda6be0e5767a078609631dca9091f9ecde6
-
SHA512
1dff8942de1ee220568a4f1ae2eebfa5b9de27fdbc4bc47460b2ba28dc8e3ec3ab55077e6fa549295ebbe3940889626264649eda761e3d879031d89340ce95e1
-
SSDEEP
24576:1KoBEm9pX4MSVHgIVxTEK+Qwsnd51RV1XPm5X0/fqrrCgPM2S8cAt8jipgXGdk:QjCX4M2pVFwq5bV1fm5C4CgPMu8jipg/
Malware Config
Extracted
xloader
2.3
uqf5
paolograssino.com
hammockcoastproperty.net
blinbins.com
financierapoorvenirsas.com
mattruddle.com
wighumanhair.com
tvdajiang14.com
theblackharvest.com
tylerrucarean.com
a-prime-india-demataccount.zone
amboselisafarigallery.info
toolbnbapp.com
scientificindustrial.com
trainup-wall.com
pocosmo.com
thebluepottingtable.com
leavelogs.com
verbalfreedom.com
qa4i.com
kiiikoo.com
glossedbythebrat.com
gorditasdemaiz.com
healthystartswithin.com
homeanddesignstudio.com
skalewide.com
bestdispatchtowitnesstoday.info
cineconhisense.com
mahibhardwaj.com
imperatrizacam.com
bezoekburen.com
qbakan.com
ansalapishagunrealestate.com
crow94723.com
kosova.one
chhhju.com
cominghomestead.com
ingenious.care
unclesamsoftware.com
xn--cfe12fhb.com
tradinglantern.com
wwwthedrudgereport.com
researchinnovations.net
to-cs.com
sandia.info
tachibana-fukushima.com
pzzfw.com
flockuplabs.com
stays.travel
itertempora.net
murrietayoga.com
plus5tocrafting.com
ovidrelprefilledsyringe.com
prltoday.com
l24consultants.net
mexicobeachselfstorage.com
bnvjufj.icu
schulze.media
thewinebarrel.info
blesst.tech
newtec.life
acmarketinghacks.com
elitevillaholidays.com
pr-daily.com
cgjanvier.com
culturalinterface.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1340-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1340-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2972-24-0x0000000000BD0000-0x0000000000BF9000-memory.dmp xloader -
Blocklisted process makes network request 1 IoCs
flow pid Process 46 2972 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2604 set thread context of 1340 2604 0rder-bcm_23062021.exe 100 PID 1340 set thread context of 3536 1340 RegSvcs.exe 56 PID 2972 set thread context of 3536 2972 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0rder-bcm_23062021.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 2604 0rder-bcm_23062021.exe 2604 0rder-bcm_23062021.exe 2604 0rder-bcm_23062021.exe 2604 0rder-bcm_23062021.exe 1340 RegSvcs.exe 1340 RegSvcs.exe 1340 RegSvcs.exe 1340 RegSvcs.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe 2972 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1340 RegSvcs.exe 1340 RegSvcs.exe 1340 RegSvcs.exe 2972 cmd.exe 2972 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 0rder-bcm_23062021.exe Token: SeDebugPrivilege 1340 RegSvcs.exe Token: SeDebugPrivilege 2972 cmd.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2604 wrote to memory of 1340 2604 0rder-bcm_23062021.exe 100 PID 2604 wrote to memory of 1340 2604 0rder-bcm_23062021.exe 100 PID 2604 wrote to memory of 1340 2604 0rder-bcm_23062021.exe 100 PID 2604 wrote to memory of 1340 2604 0rder-bcm_23062021.exe 100 PID 2604 wrote to memory of 1340 2604 0rder-bcm_23062021.exe 100 PID 2604 wrote to memory of 1340 2604 0rder-bcm_23062021.exe 100 PID 3536 wrote to memory of 2972 3536 Explorer.EXE 101 PID 3536 wrote to memory of 2972 3536 Explorer.EXE 101 PID 3536 wrote to memory of 2972 3536 Explorer.EXE 101 PID 2972 wrote to memory of 4856 2972 cmd.exe 102 PID 2972 wrote to memory of 4856 2972 cmd.exe 102 PID 2972 wrote to memory of 4856 2972 cmd.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3536 -
C:\Users\Admin\AppData\Local\Temp\0rder-bcm_23062021.exe"C:\Users\Admin\AppData\Local\Temp\0rder-bcm_23062021.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1340
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Blocklisted process makes network request
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2972 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4856
-
-