Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Petrogulf 108-22.exe
Resource
win7-20240903-en
General
-
Target
Petrogulf 108-22.exe
-
Size
778KB
-
MD5
265e12d9de5e962b90ab8d8dd39e3a66
-
SHA1
2799490cd1831593b1c2694978c1dbec849bf96e
-
SHA256
28c28db28e96276f72ce38a60d04f0711388d3f93ecb34d4721dc94fc2bf9f07
-
SHA512
151e6a34dacd3a0371b7c9e5d88ecdc596074a2efc14dc834f0cf75ca5e7947224c961e985f6c32f6e6166853caff80b595c858c69088dea1866e9f4d9d2c481
-
SSDEEP
12288:WkgFEJgYYz0wnHZHEQRmYIso2huSWCL9xLEmSAQ31nPq2oK9PO/Z:q9jRdlIsvuSN5p2q2oKg/
Malware Config
Extracted
xloader
2.5
w8n5
abolpij.space
secured-service-only.com
themoihay.com
uganda-info.com
readytrove.com
nehaandrajb.com
scuolapadelroma.store
childrensartcafe.com
intelldat.com
jinxedjesterdesigns.com
smallbusinessadminfunds.com
woody.email
effetasolutions.com
miied.com
oxszdt.biz
cdxgkj.com
thebestgpstracker.com
damancavexclusive.com
digitalboat.cloud
eyelikesystems.com
advertising-machine.online
956314.xyz
datalign-autos.com
smokingforgqc.xyz
summahred.com
5nbiw.info
achbiti.com
19911102.xyz
mademoizellefifiparis.com
duxcentral.com
martens-suomi.com
neskasdreams.com
grandwincasinos.com
jfykt.com
sleepymatngu.xyz
suburbaniecnnq.xyz
brichellecosmeticsllc.com
bethanyella.com
fleksibelku.com
packworldindia.com
khlailacar.com
pol360.com
sportmasster.host
nagoyaenglish.com
pulsarwood.club
allbiobd.com
nicolerussellcoaching.com
moneymanonline2407.xyz
xn--42cg2czax6ptae6a.com
heipaper.xyz
letyourheartwrite.com
coverdale.group
fraiuhs.com
hoanext.com
expressiveartsoregon.com
jakubkokoszka.net
coco002.com
www59345.com
theoaktreegym.com
airemspapartments.com
chackeddo.com
nurtcs.com
vinetes.com
verdantrofhma.xyz
sacramentoprintingservices.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/436-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/436-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2412-23-0x0000000000590000-0x00000000005B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 5064 set thread context of 436 5064 Petrogulf 108-22.exe 91 PID 436 set thread context of 3452 436 MSBuild.exe 54 PID 2412 set thread context of 3452 2412 mstsc.exe 54 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Petrogulf 108-22.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 436 MSBuild.exe 436 MSBuild.exe 436 MSBuild.exe 436 MSBuild.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe 2412 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 436 MSBuild.exe 436 MSBuild.exe 436 MSBuild.exe 2412 mstsc.exe 2412 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 436 MSBuild.exe Token: SeDebugPrivilege 2412 mstsc.exe Token: SeShutdownPrivilege 3452 Explorer.EXE Token: SeCreatePagefilePrivilege 3452 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 5064 wrote to memory of 436 5064 Petrogulf 108-22.exe 91 PID 5064 wrote to memory of 436 5064 Petrogulf 108-22.exe 91 PID 5064 wrote to memory of 436 5064 Petrogulf 108-22.exe 91 PID 5064 wrote to memory of 436 5064 Petrogulf 108-22.exe 91 PID 5064 wrote to memory of 436 5064 Petrogulf 108-22.exe 91 PID 5064 wrote to memory of 436 5064 Petrogulf 108-22.exe 91 PID 3452 wrote to memory of 2412 3452 Explorer.EXE 92 PID 3452 wrote to memory of 2412 3452 Explorer.EXE 92 PID 3452 wrote to memory of 2412 3452 Explorer.EXE 92 PID 2412 wrote to memory of 4436 2412 mstsc.exe 93 PID 2412 wrote to memory of 4436 2412 mstsc.exe 93 PID 2412 wrote to memory of 4436 2412 mstsc.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Petrogulf 108-22.exe"C:\Users\Admin\AppData\Local\Temp\Petrogulf 108-22.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:436
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4436
-
-