Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Petrogulf 108-22.exe
Resource
win7-20240903-en
General
-
Target
Petrogulf 108-22.exe
-
Size
778KB
-
MD5
265e12d9de5e962b90ab8d8dd39e3a66
-
SHA1
2799490cd1831593b1c2694978c1dbec849bf96e
-
SHA256
28c28db28e96276f72ce38a60d04f0711388d3f93ecb34d4721dc94fc2bf9f07
-
SHA512
151e6a34dacd3a0371b7c9e5d88ecdc596074a2efc14dc834f0cf75ca5e7947224c961e985f6c32f6e6166853caff80b595c858c69088dea1866e9f4d9d2c481
-
SSDEEP
12288:WkgFEJgYYz0wnHZHEQRmYIso2huSWCL9xLEmSAQ31nPq2oK9PO/Z:q9jRdlIsvuSN5p2q2oKg/
Malware Config
Extracted
xloader
2.5
w8n5
abolpij.space
secured-service-only.com
themoihay.com
uganda-info.com
readytrove.com
nehaandrajb.com
scuolapadelroma.store
childrensartcafe.com
intelldat.com
jinxedjesterdesigns.com
smallbusinessadminfunds.com
woody.email
effetasolutions.com
miied.com
oxszdt.biz
cdxgkj.com
thebestgpstracker.com
damancavexclusive.com
digitalboat.cloud
eyelikesystems.com
advertising-machine.online
956314.xyz
datalign-autos.com
smokingforgqc.xyz
summahred.com
5nbiw.info
achbiti.com
19911102.xyz
mademoizellefifiparis.com
duxcentral.com
martens-suomi.com
neskasdreams.com
grandwincasinos.com
jfykt.com
sleepymatngu.xyz
suburbaniecnnq.xyz
brichellecosmeticsllc.com
bethanyella.com
fleksibelku.com
packworldindia.com
khlailacar.com
pol360.com
sportmasster.host
nagoyaenglish.com
pulsarwood.club
allbiobd.com
nicolerussellcoaching.com
moneymanonline2407.xyz
xn--42cg2czax6ptae6a.com
heipaper.xyz
letyourheartwrite.com
coverdale.group
fraiuhs.com
hoanext.com
expressiveartsoregon.com
jakubkokoszka.net
coco002.com
www59345.com
theoaktreegym.com
airemspapartments.com
chackeddo.com
nurtcs.com
vinetes.com
verdantrofhma.xyz
sacramentoprintingservices.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2916-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2916-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2916-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2464-27-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2096 set thread context of 2916 2096 Petrogulf 108-22.exe 31 PID 2916 set thread context of 1216 2916 MSBuild.exe 21 PID 2916 set thread context of 1216 2916 MSBuild.exe 21 PID 2464 set thread context of 1216 2464 NAPSTAT.EXE 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Petrogulf 108-22.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 2916 MSBuild.exe 2916 MSBuild.exe 2916 MSBuild.exe 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2916 MSBuild.exe 2916 MSBuild.exe 2916 MSBuild.exe 2916 MSBuild.exe 2464 NAPSTAT.EXE 2464 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2916 MSBuild.exe Token: SeDebugPrivilege 2464 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 2096 wrote to memory of 2916 2096 Petrogulf 108-22.exe 31 PID 1216 wrote to memory of 2464 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2464 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2464 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2464 1216 Explorer.EXE 32 PID 2464 wrote to memory of 2664 2464 NAPSTAT.EXE 33 PID 2464 wrote to memory of 2664 2464 NAPSTAT.EXE 33 PID 2464 wrote to memory of 2664 2464 NAPSTAT.EXE 33 PID 2464 wrote to memory of 2664 2464 NAPSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Petrogulf 108-22.exe"C:\Users\Admin\AppData\Local\Temp\Petrogulf 108-22.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2916
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2664
-
-