Analysis
-
max time kernel
148s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
PaymentConfirmation.pdf.exe
Resource
win7-20241010-en
General
-
Target
PaymentConfirmation.pdf.exe
-
Size
1014KB
-
MD5
f2a0c0fca9e437943ac26f4a5a550c3b
-
SHA1
a564eb697909bcf14793847e6d4932505484cfd1
-
SHA256
ad1fd339fec0509bf7e080d05d7ab6d4a2e66c5a6c6e2ccb28d3452852fea15b
-
SHA512
1a2f2247419d7575daeeab51012049f512c7900e5f05e654f79c8d08e3baf6d239cc1020ace6fe1ace393222bd70d2e4539e13abbe10575987da7c253e244074
-
SSDEEP
12288:bszf287Whiwuo3hqUxX7FklStMGlDHwvgiuHL1QqVrV6Tbk+nKe:bUf2JhLX7Fkle5DHjHL1QqzKbBJ
Malware Config
Extracted
xloader
2.3
jeiq
casuallyso.com
mismirasoles.com
nunostacos.com
zboubdiel.com
eternellebynh.com
radsum.info
sddianshang56.com
citriodiolspray.com
khoza3a.com
reelhooker-phuket.com
pumpbrokers.com
wallstreetbnb.com
realestatewithtiff.com
rockstarleading.com
goddesslovebeauty.com
zulaolao.com
openwateradventurers.com
xn--zqsv0e44iqw9c.space
lingxiaojiaoyu.com
wetrabbitexpress.com
globaltrainingmarketplace.net
raffoll.wales
sugarsmartchef.com
thelaundering.com
delbombo.com
absoluteresolve.com
syzvge98mzwg0p5y7ofe.net
treejumper.com
xn--4qra098lba.com
finer-thread.com
vickypuckett.com
communal.coffee
thebevyastoria.com
6232125.com
blackfridaytakeover.com
freegroovefunnelsreviews.com
alessandronarducciaward.com
progressiveneighborsmd.com
entreonline.com
mobanabc.com
lestrustee.com
abehseramedicals.com
purebreedchihuahuas.com
dasraw.com
unettax.com
moivimghelp.com
bvillecap.com
lnvestcloud.com
waheedk.com
goobet33.com
lotusmt2.com
difital-affects.com
4mam7uygy7d.net
smartechsavvy.com
vstimi.com
brateix.info
juicydc.com
psycheandpoetry.com
trynav.com
xn--pta-bma.com
wonderlandwax.com
cyberxy.com
frosecongelados.xyz
howtobuyrepos.com
adsworker.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2052-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2052-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2656-22-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 3064 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2536 set thread context of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2052 set thread context of 1256 2052 PaymentConfirmation.pdf.exe 21 PID 2656 set thread context of 1256 2656 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PaymentConfirmation.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2052 PaymentConfirmation.pdf.exe 2052 PaymentConfirmation.pdf.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe 2656 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2052 PaymentConfirmation.pdf.exe 2052 PaymentConfirmation.pdf.exe 2052 PaymentConfirmation.pdf.exe 2656 control.exe 2656 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2052 PaymentConfirmation.pdf.exe Token: SeDebugPrivilege 2656 control.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 2536 wrote to memory of 2052 2536 PaymentConfirmation.pdf.exe 30 PID 1256 wrote to memory of 2656 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2656 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2656 1256 Explorer.EXE 31 PID 1256 wrote to memory of 2656 1256 Explorer.EXE 31 PID 2656 wrote to memory of 3064 2656 control.exe 32 PID 2656 wrote to memory of 3064 2656 control.exe 32 PID 2656 wrote to memory of 3064 2656 control.exe 32 PID 2656 wrote to memory of 3064 2656 control.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2052
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3064
-
-