Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
balance invoice-3547542428_pdf.exe
Resource
win7-20240903-en
General
-
Target
balance invoice-3547542428_pdf.exe
-
Size
848KB
-
MD5
c3dee40777d198b0c2b202efa09544ca
-
SHA1
844ecd0e8303ee9c0d0a478d8fb9bb8b7bf5f2a4
-
SHA256
b496f743cf4cd880575f37fef2db5c36b857c36afd77f578fc80a19b02cd8b30
-
SHA512
c4a60605584b531cdc6b8d35c3067b19e401c78ff1ee32ba8e8e7d1a82c1e74a5d3957d636d41bbb0b8617cfb91533616491eecf3315128272376d4afd6956ae
-
SSDEEP
6144:xfWbU6Uq/ejSo047vgI9y0zJIbjG8YCsxqFsGsLgM03YFfi9hcaHv1b7nCLBgXIk:1kUmNEzgInlYxPsx2P9hcE1HCVp4
Malware Config
Extracted
xloader
2.5
iwtr
srikrishnadental.com
outthedoorinfive.com
batamgle.com
leela-13senses.com
iyhouse.space
brazzalb.com
camperinnrv.com
hageteruossan.com
alicepassion.com
wearethecardclinics.com
thenortherntechgroup.com
akademiarelacji.com
garu.club
brandscoop.net
ejassatulima.xyz
cdo-latam.com
noireimpactcollective.com
poquitotodo.com
g04urs14.com
mgytekstil.com
layeredgomptp.xyz
bancai.mobi
helpindia.store
meccatm.com
ck6365.com
ischoolsoft.com
9lzz.xyz
currentindianscience.com
loosesalatoyof4.xyz
lastminutesindia.com
lightsinwall.com
florenteus.com
fosterscientist.com
sergomosta.com
catskillstnpasumo2.xyz
5gse4u.top
champ-beauty-hanazono.com
yardwerk.net
moorheadsdiner.com
nationwidewine.online
embrase.online
caldepassioni.com
theclotheclean.com
smartdoctor.info
tomessagenow0715.com
dollyit.systems
pshkr.art
kryptocoaching.com
warriorsboxingacademy.club
polistanok.space
aimaster.tech
emilyperspectives.com
applykpologistics.com
472921.com
swietnacera.com
roofingcontractorhammondla.com
moukse.com
pennylux.top
calebwhisler.com
gamingbd.pro
lojambcenter.com
lemonandlush.net
redmondsl.com
gjzzhjzp.com
ghjd-52mml.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2580-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2580-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2884-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 324 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1204 set thread context of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 2580 set thread context of 1156 2580 balance invoice-3547542428_pdf.exe 21 PID 2884 set thread context of 1156 2884 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language balance invoice-3547542428_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2580 balance invoice-3547542428_pdf.exe 2580 balance invoice-3547542428_pdf.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe 2884 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2580 balance invoice-3547542428_pdf.exe 2580 balance invoice-3547542428_pdf.exe 2580 balance invoice-3547542428_pdf.exe 2884 colorcpl.exe 2884 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2580 balance invoice-3547542428_pdf.exe Token: SeDebugPrivilege 2884 colorcpl.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1204 wrote to memory of 2580 1204 balance invoice-3547542428_pdf.exe 30 PID 1156 wrote to memory of 2884 1156 Explorer.EXE 31 PID 1156 wrote to memory of 2884 1156 Explorer.EXE 31 PID 1156 wrote to memory of 2884 1156 Explorer.EXE 31 PID 1156 wrote to memory of 2884 1156 Explorer.EXE 31 PID 2884 wrote to memory of 324 2884 colorcpl.exe 32 PID 2884 wrote to memory of 324 2884 colorcpl.exe 32 PID 2884 wrote to memory of 324 2884 colorcpl.exe 32 PID 2884 wrote to memory of 324 2884 colorcpl.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\balance invoice-3547542428_pdf.exe"C:\Users\Admin\AppData\Local\Temp\balance invoice-3547542428_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\balance invoice-3547542428_pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2580
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\balance invoice-3547542428_pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:324
-
-