Analysis
-
max time kernel
149s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Sparetronics - Line Card.exe
Resource
win7-20241010-en
General
-
Target
Sparetronics - Line Card.exe
-
Size
790KB
-
MD5
0d15a3865c8e7c9ff7d9632969281f45
-
SHA1
3794ebfcda17346aa11f6a56ba05ed4ef1105642
-
SHA256
aac488250a4059c3a5fe215e9d37649ac3666e1acb0ffa9031d7a5b171f951e1
-
SHA512
2b1198db896cf56ee05f1ecada8da7bc809557d2364d92cadd9c64d2c573c2206cdd8b5e83b7ddc60ce15f1374eb8eeba139bff6656d1fc268a41176a1b91f4a
-
SSDEEP
12288:rSskqu7Es0xrVHB2kDRkAU7Ed1phEnUJp058NxjzCrwW7ZG9sVbXbs+XPgDdVAad:msCQrM74d1phEU48nCLss54dVAanpo
Malware Config
Extracted
xloader
2.3
sbjq
topbrandslook.xyz
kupilabs.com
cedrick.net
91mh.info
ajoph.net
finishtheverse.com
pondokquranaljariyah.com
happyhoopoe.com
lowcostfooddelivery.com
estudiosvacunacovid19-co.com
iestradanhhome.com
xn--caasymas-e3a.com
shopqls.com
wpnator.com
parentedagency.com
nundmshop.com
lodosmimarlik.com
ccidyy.xyz
bem-vestida.com
smartincomeafrica.com
luckydaysshop.com
spaceorbits.net
mindtattooed.com
pengruncapital.com
colesmxth.com
biyahetours.com
15211avis.com
marshylime.com
cinmax.xyz
marriedtwomusic.com
fakingslatino.com
slotspinbet.com
classicluxuryboats.com
missjenniferteaches.com
minimalismoweb.com
mlblandscaping.co.uk
gzotuo.com
coffeetaste0.com
ylty88.com
437bowlinggreen.com
hinetin.net
umkateknoloji.com
bnsubstock.com
ftxhxx.com
russellandcompanyrealestate.com
hamrocity.com
thenicolehernandez.com
afspinc.com
artlyusa.com
cryptocurrencydefi.com
betteryouwiththeoils.com
energetichealingsystem.com
lucaslh.com
undeadvengeance.com
count230.com
landerauto.com
sxqxga.com
assetsking.com
prosperedfreelancing.com
bee-yondimagination.com
androidwerks.com
securitymanagementcfo.com
iwouldbetonthat.com
appstore-verify-appleid.com
allindiatrust.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/392-3-0x0000000000760000-0x0000000000772000-memory.dmp CustAttr -
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2508-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2508-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2508-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3064-28-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1144 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 392 set thread context of 2508 392 Sparetronics - Line Card.exe 29 PID 2508 set thread context of 1360 2508 Sparetronics - Line Card.exe 20 PID 2508 set thread context of 1360 2508 Sparetronics - Line Card.exe 20 PID 3064 set thread context of 1360 3064 wlanext.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sparetronics - Line Card.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
pid Process 392 Sparetronics - Line Card.exe 392 Sparetronics - Line Card.exe 2508 Sparetronics - Line Card.exe 2508 Sparetronics - Line Card.exe 2508 Sparetronics - Line Card.exe 3064 wlanext.exe 3064 wlanext.exe 3064 wlanext.exe 3064 wlanext.exe 3064 wlanext.exe 3064 wlanext.exe 3064 wlanext.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2508 Sparetronics - Line Card.exe 2508 Sparetronics - Line Card.exe 2508 Sparetronics - Line Card.exe 2508 Sparetronics - Line Card.exe 3064 wlanext.exe 3064 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 392 Sparetronics - Line Card.exe Token: SeDebugPrivilege 2508 Sparetronics - Line Card.exe Token: SeDebugPrivilege 3064 wlanext.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 392 wrote to memory of 2508 392 Sparetronics - Line Card.exe 29 PID 1360 wrote to memory of 3064 1360 Explorer.EXE 30 PID 1360 wrote to memory of 3064 1360 Explorer.EXE 30 PID 1360 wrote to memory of 3064 1360 Explorer.EXE 30 PID 1360 wrote to memory of 3064 1360 Explorer.EXE 30 PID 3064 wrote to memory of 1144 3064 wlanext.exe 31 PID 3064 wrote to memory of 1144 3064 wlanext.exe 31 PID 3064 wrote to memory of 1144 3064 wlanext.exe 31 PID 3064 wrote to memory of 1144 3064 wlanext.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2508
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1144
-
-