Analysis
-
max time kernel
149s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
New-Order,pdf.exe
Resource
win7-20240903-en
General
-
Target
New-Order,pdf.exe
-
Size
749KB
-
MD5
aaaf770b9da9ed45ca73b495eb6221ef
-
SHA1
0031c174a1dcae63a5aa259dde8e3062e17a68bd
-
SHA256
9ff1a6a0e9326633316aff39f81d9e4a132db16fee4acc1fb25173fbe7d9ba7e
-
SHA512
213d19cb5abd83bf2eb903887856b182d8111e857b9dd9a0eedbcef4c945290108f3904cb95d04595f1b19227c494d28a0b202d3b2dc3dcc6db9c17bac479695
-
SSDEEP
12288:mby0chFFQWNA0CsK+JBVsqit9vkpShrKvjZKnkmGDtoxKPdU7OVH8dz:mbHchF91K+JBV8ZkwhrKLMngH+OVH2
Malware Config
Extracted
xloader
2.5
u8yc
nutricionclinicaveterinaria.com
deployinghigh.com
buyulever.icu
stevencarter.love
creditcardschoicescandot.com
frangeskvor.quest
parkerstagingdesign.com
complexfund.com
aanikin.com
goodearthteeco.com
slouchsofas.com
smilebrain.club
launchyoursurveyfunnel.com
grandcazino.net
aminsfy.com
typingform.com
buten.xyz
vicinaathain.quest
opusludo.com
toncekovpodrum.com
guarderiasenqueretaro.com
litemisens.com
52buyu.icu
immobilier-alienor.net
username.store
stickitco.com
quik.host
moringanuttreeherbs.com
2-97drumalbynroad.com
petventive.com
gebeva2020.com
katchybugonsale.com
lloydmillerlawgroup.com
rvrassociate.com
islandbased.com
iplgv.com
6008quintessadrive.com
deleaderainfluenceur.com
they-c.com
themozarts.com
firstborneggs.com
enterpriseriskmitigation.com
mfpartiesmore.com
gameschips.com
privateerspace.space
astraeasec.com
go2ghebres.com
reablemed.xyz
291861.com
dewy-buy.com
256jz.com
vinayakaelectronics.com
compassrofabd.xyz
kmtyfuck.club
randjmarketplace.com
thedeliciousrestaurant.com
zj1j.com
accuratelogisticspro.com
remind-coaching.com
kreartech.com
jecivandonutricionista.online
297471.com
ugcareersguide.com
dayanzai.store
exclusivoclub.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2696-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2696-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4856-25-0x0000000000740000-0x0000000000769000-memory.dmp xloader behavioral2/memory/4856-27-0x0000000000740000-0x0000000000769000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2244 set thread context of 2696 2244 New-Order,pdf.exe 99 PID 2696 set thread context of 3436 2696 New-Order,pdf.exe 56 PID 4856 set thread context of 3436 4856 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language New-Order,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 2696 New-Order,pdf.exe 2696 New-Order,pdf.exe 2696 New-Order,pdf.exe 2696 New-Order,pdf.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe 4856 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2696 New-Order,pdf.exe 2696 New-Order,pdf.exe 2696 New-Order,pdf.exe 4856 msiexec.exe 4856 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2696 New-Order,pdf.exe Token: SeDebugPrivilege 4856 msiexec.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2244 wrote to memory of 2696 2244 New-Order,pdf.exe 99 PID 2244 wrote to memory of 2696 2244 New-Order,pdf.exe 99 PID 2244 wrote to memory of 2696 2244 New-Order,pdf.exe 99 PID 2244 wrote to memory of 2696 2244 New-Order,pdf.exe 99 PID 2244 wrote to memory of 2696 2244 New-Order,pdf.exe 99 PID 2244 wrote to memory of 2696 2244 New-Order,pdf.exe 99 PID 3436 wrote to memory of 4856 3436 Explorer.EXE 100 PID 3436 wrote to memory of 4856 3436 Explorer.EXE 100 PID 3436 wrote to memory of 4856 3436 Explorer.EXE 100 PID 4856 wrote to memory of 4420 4856 msiexec.exe 101 PID 4856 wrote to memory of 4420 4856 msiexec.exe 101 PID 4856 wrote to memory of 4420 4856 msiexec.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2696
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4856 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4420
-
-