Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
PDF_Scan-AWB#5305323204640.exe
Resource
win7-20240903-en
General
-
Target
PDF_Scan-AWB#5305323204640.exe
-
Size
1.6MB
-
MD5
fbd0913a7ff1c25f30509841f784ba06
-
SHA1
65384b25ec04d910d2f1dea75692477a9e95d645
-
SHA256
823cba52fb307afbd762ff01b52ca62586a126065f2a914c5e6b1ce3c203ba8e
-
SHA512
ea4b1cc7b45e78982146a84f2d10b118d51957ad0966b6248225aab0b39f5ac17aa3a055c79d677b6182b38239dfe297c76514d676aa2a2094b4bce029ef8901
-
SSDEEP
24576:Qx6i0dzjqYeiktfhv1X9eL3xQv7towhrDj:QA3dyBtfhNX9ejxQv7Lvj
Malware Config
Extracted
xloader
2.5
uuv8
aktaxconsultants.com
earthingchallenge.com
skautz.com
howtousebeardbalm.com
benjaminpeto.com
houstonhighpoint.com
trackerci.digital
cherishedbuildings.com
raphiademadagascar.com
wewillbeaok.com
diyhelp.xyz
hl8mkt.com
karensoansemusicteacher.com
duibuqinibaoqian33.xyz
genslerhop.com
lmi-russia.com
deeptissuemexico.com
sienddo.online
4002poinsettia.com
sleepcatcherzzz.com
christincarver.com
areyoufuckingnuts.com
sweetcrazyboy.net
this-lash-cosmetics.xyz
trips4free.com
literatist.xyz
usbaraah.xyz
indiefunnels.net
champpoint.com
rural-explorer.com
levekrsmm.quest
np073-subsc-bm.com
applicationmart.xyz
prasanna.one
economizecombustivel.host
ikkbs-a02.com
gytrjx.com
alert78.info
gingure.com
erebajas.com
cyber365solution.com
newspaper.team
fase-blog.com
xubo679.com
zhaolucn.com
ktnblow.xyz
visualshop.store
khpet.xyz
885220.com
neuralevent.com
bophelopelefoundation.com
fitness-romelly.com
cottagepor.xyz
jobalrtforme.com
boutique-vanguard.com
euterraconsulting.com
shadyoaklearning.com
braktonem.quest
workroom365.cloud
zenentertainmentworld.com
hugpure.com
amazingcmo.com
atlantidepc.com
mikevideodirection.online
yiyh.net
Signatures
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Oracle\VirtualBox Guest Additions PDF_Scan-AWB#5305323204640.exe -
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4624-11-0x0000000000400000-0x0000000000453000-memory.dmp xloader behavioral2/memory/4624-14-0x0000000000400000-0x0000000000453000-memory.dmp xloader behavioral2/memory/3484-25-0x0000000000C50000-0x0000000000C79000-memory.dmp xloader -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\VMware, Inc.\VMware Tools PDF_Scan-AWB#5305323204640.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion PDF_Scan-AWB#5305323204640.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion PDF_Scan-AWB#5305323204640.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum PDF_Scan-AWB#5305323204640.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\disk\Enum\0 PDF_Scan-AWB#5305323204640.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3052 set thread context of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 4624 set thread context of 3444 4624 credwiz.exe 56 PID 3484 set thread context of 3444 3484 WWAHost.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PDF_Scan-AWB#5305323204640.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language credwiz.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WWAHost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 4624 credwiz.exe 4624 credwiz.exe 4624 credwiz.exe 4624 credwiz.exe 3052 PDF_Scan-AWB#5305323204640.exe 3052 PDF_Scan-AWB#5305323204640.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe 3484 WWAHost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4624 credwiz.exe 4624 credwiz.exe 4624 credwiz.exe 3484 WWAHost.exe 3484 WWAHost.exe -
Suspicious use of AdjustPrivilegeToken 9 IoCs
description pid Process Token: SeDebugPrivilege 3052 PDF_Scan-AWB#5305323204640.exe Token: SeDebugPrivilege 4624 credwiz.exe Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeShutdownPrivilege 3444 Explorer.EXE Token: SeCreatePagefilePrivilege 3444 Explorer.EXE Token: SeDebugPrivilege 3484 WWAHost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3052 wrote to memory of 4624 3052 PDF_Scan-AWB#5305323204640.exe 84 PID 3444 wrote to memory of 3484 3444 Explorer.EXE 85 PID 3444 wrote to memory of 3484 3444 Explorer.EXE 85 PID 3444 wrote to memory of 3484 3444 Explorer.EXE 85 PID 3484 wrote to memory of 1568 3484 WWAHost.exe 92 PID 3484 wrote to memory of 1568 3484 WWAHost.exe 92 PID 3484 wrote to memory of 1568 3484 WWAHost.exe 92
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3444 -
C:\Users\Admin\AppData\Local\Temp\PDF_Scan-AWB#5305323204640.exe"C:\Users\Admin\AppData\Local\Temp\PDF_Scan-AWB#5305323204640.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Windows\SysWOW64\credwiz.exe"C:\Windows\SysWOW64\credwiz.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4624
-
-
-
C:\Windows\SysWOW64\WWAHost.exe"C:\Windows\SysWOW64\WWAHost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\credwiz.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1568
-
-