Analysis
-
max time kernel
146s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:55
Static task
static1
Behavioral task
behavioral1
Sample
Sparetronics - Line Card.exe
Resource
win7-20241010-en
General
-
Target
Sparetronics - Line Card.exe
-
Size
790KB
-
MD5
0d15a3865c8e7c9ff7d9632969281f45
-
SHA1
3794ebfcda17346aa11f6a56ba05ed4ef1105642
-
SHA256
aac488250a4059c3a5fe215e9d37649ac3666e1acb0ffa9031d7a5b171f951e1
-
SHA512
2b1198db896cf56ee05f1ecada8da7bc809557d2364d92cadd9c64d2c573c2206cdd8b5e83b7ddc60ce15f1374eb8eeba139bff6656d1fc268a41176a1b91f4a
-
SSDEEP
12288:rSskqu7Es0xrVHB2kDRkAU7Ed1phEnUJp058NxjzCrwW7ZG9sVbXbs+XPgDdVAad:msCQrM74d1phEU48nCLss54dVAanpo
Malware Config
Extracted
xloader
2.3
sbjq
topbrandslook.xyz
kupilabs.com
cedrick.net
91mh.info
ajoph.net
finishtheverse.com
pondokquranaljariyah.com
happyhoopoe.com
lowcostfooddelivery.com
estudiosvacunacovid19-co.com
iestradanhhome.com
xn--caasymas-e3a.com
shopqls.com
wpnator.com
parentedagency.com
nundmshop.com
lodosmimarlik.com
ccidyy.xyz
bem-vestida.com
smartincomeafrica.com
luckydaysshop.com
spaceorbits.net
mindtattooed.com
pengruncapital.com
colesmxth.com
biyahetours.com
15211avis.com
marshylime.com
cinmax.xyz
marriedtwomusic.com
fakingslatino.com
slotspinbet.com
classicluxuryboats.com
missjenniferteaches.com
minimalismoweb.com
mlblandscaping.co.uk
gzotuo.com
coffeetaste0.com
ylty88.com
437bowlinggreen.com
hinetin.net
umkateknoloji.com
bnsubstock.com
ftxhxx.com
russellandcompanyrealestate.com
hamrocity.com
thenicolehernandez.com
afspinc.com
artlyusa.com
cryptocurrencydefi.com
betteryouwiththeoils.com
energetichealingsystem.com
lucaslh.com
undeadvengeance.com
count230.com
landerauto.com
sxqxga.com
assetsking.com
prosperedfreelancing.com
bee-yondimagination.com
androidwerks.com
securitymanagementcfo.com
iwouldbetonthat.com
appstore-verify-appleid.com
allindiatrust.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4884-8-0x0000000005080000-0x0000000005092000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4620-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4620-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1732-24-0x0000000000F80000-0x0000000000FA9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4884 set thread context of 4620 4884 Sparetronics - Line Card.exe 100 PID 4620 set thread context of 3396 4620 Sparetronics - Line Card.exe 56 PID 1732 set thread context of 3396 1732 cmd.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Sparetronics - Line Card.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 4884 Sparetronics - Line Card.exe 4884 Sparetronics - Line Card.exe 4884 Sparetronics - Line Card.exe 4884 Sparetronics - Line Card.exe 4884 Sparetronics - Line Card.exe 4620 Sparetronics - Line Card.exe 4620 Sparetronics - Line Card.exe 4620 Sparetronics - Line Card.exe 4620 Sparetronics - Line Card.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe 1732 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4620 Sparetronics - Line Card.exe 4620 Sparetronics - Line Card.exe 4620 Sparetronics - Line Card.exe 1732 cmd.exe 1732 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4884 Sparetronics - Line Card.exe Token: SeDebugPrivilege 4620 Sparetronics - Line Card.exe Token: SeDebugPrivilege 1732 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4884 wrote to memory of 3060 4884 Sparetronics - Line Card.exe 99 PID 4884 wrote to memory of 3060 4884 Sparetronics - Line Card.exe 99 PID 4884 wrote to memory of 3060 4884 Sparetronics - Line Card.exe 99 PID 4884 wrote to memory of 4620 4884 Sparetronics - Line Card.exe 100 PID 4884 wrote to memory of 4620 4884 Sparetronics - Line Card.exe 100 PID 4884 wrote to memory of 4620 4884 Sparetronics - Line Card.exe 100 PID 4884 wrote to memory of 4620 4884 Sparetronics - Line Card.exe 100 PID 4884 wrote to memory of 4620 4884 Sparetronics - Line Card.exe 100 PID 4884 wrote to memory of 4620 4884 Sparetronics - Line Card.exe 100 PID 3396 wrote to memory of 1732 3396 Explorer.EXE 101 PID 3396 wrote to memory of 1732 3396 Explorer.EXE 101 PID 3396 wrote to memory of 1732 3396 Explorer.EXE 101 PID 1732 wrote to memory of 4692 1732 cmd.exe 102 PID 1732 wrote to memory of 4692 1732 cmd.exe 102 PID 1732 wrote to memory of 4692 1732 cmd.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"3⤵PID:3060
-
-
C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4620
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Sparetronics - Line Card.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4692
-
-