Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:57
Static task
static1
Behavioral task
behavioral1
Sample
PaymentConfirmation.pdf.exe
Resource
win7-20241010-en
General
-
Target
PaymentConfirmation.pdf.exe
-
Size
1014KB
-
MD5
f2a0c0fca9e437943ac26f4a5a550c3b
-
SHA1
a564eb697909bcf14793847e6d4932505484cfd1
-
SHA256
ad1fd339fec0509bf7e080d05d7ab6d4a2e66c5a6c6e2ccb28d3452852fea15b
-
SHA512
1a2f2247419d7575daeeab51012049f512c7900e5f05e654f79c8d08e3baf6d239cc1020ace6fe1ace393222bd70d2e4539e13abbe10575987da7c253e244074
-
SSDEEP
12288:bszf287Whiwuo3hqUxX7FklStMGlDHwvgiuHL1QqVrV6Tbk+nKe:bUf2JhLX7Fkle5DHjHL1QqzKbBJ
Malware Config
Extracted
xloader
2.3
jeiq
casuallyso.com
mismirasoles.com
nunostacos.com
zboubdiel.com
eternellebynh.com
radsum.info
sddianshang56.com
citriodiolspray.com
khoza3a.com
reelhooker-phuket.com
pumpbrokers.com
wallstreetbnb.com
realestatewithtiff.com
rockstarleading.com
goddesslovebeauty.com
zulaolao.com
openwateradventurers.com
xn--zqsv0e44iqw9c.space
lingxiaojiaoyu.com
wetrabbitexpress.com
globaltrainingmarketplace.net
raffoll.wales
sugarsmartchef.com
thelaundering.com
delbombo.com
absoluteresolve.com
syzvge98mzwg0p5y7ofe.net
treejumper.com
xn--4qra098lba.com
finer-thread.com
vickypuckett.com
communal.coffee
thebevyastoria.com
6232125.com
blackfridaytakeover.com
freegroovefunnelsreviews.com
alessandronarducciaward.com
progressiveneighborsmd.com
entreonline.com
mobanabc.com
lestrustee.com
abehseramedicals.com
purebreedchihuahuas.com
dasraw.com
unettax.com
moivimghelp.com
bvillecap.com
lnvestcloud.com
waheedk.com
goobet33.com
lotusmt2.com
difital-affects.com
4mam7uygy7d.net
smartechsavvy.com
vstimi.com
brateix.info
juicydc.com
psycheandpoetry.com
trynav.com
xn--pta-bma.com
wonderlandwax.com
cyberxy.com
frosecongelados.xyz
howtobuyrepos.com
adsworker.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/428-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/428-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3708-23-0x0000000000AF0000-0x0000000000B18000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4460 set thread context of 428 4460 PaymentConfirmation.pdf.exe 102 PID 428 set thread context of 3532 428 PaymentConfirmation.pdf.exe 56 PID 3708 set thread context of 3532 3708 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PaymentConfirmation.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 428 PaymentConfirmation.pdf.exe 428 PaymentConfirmation.pdf.exe 428 PaymentConfirmation.pdf.exe 428 PaymentConfirmation.pdf.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe 3708 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 428 PaymentConfirmation.pdf.exe 428 PaymentConfirmation.pdf.exe 428 PaymentConfirmation.pdf.exe 3708 msdt.exe 3708 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 428 PaymentConfirmation.pdf.exe Token: SeDebugPrivilege 3708 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4460 wrote to memory of 428 4460 PaymentConfirmation.pdf.exe 102 PID 4460 wrote to memory of 428 4460 PaymentConfirmation.pdf.exe 102 PID 4460 wrote to memory of 428 4460 PaymentConfirmation.pdf.exe 102 PID 4460 wrote to memory of 428 4460 PaymentConfirmation.pdf.exe 102 PID 4460 wrote to memory of 428 4460 PaymentConfirmation.pdf.exe 102 PID 4460 wrote to memory of 428 4460 PaymentConfirmation.pdf.exe 102 PID 3532 wrote to memory of 3708 3532 Explorer.EXE 103 PID 3532 wrote to memory of 3708 3532 Explorer.EXE 103 PID 3532 wrote to memory of 3708 3532 Explorer.EXE 103 PID 3708 wrote to memory of 4816 3708 msdt.exe 104 PID 3708 wrote to memory of 4816 3708 msdt.exe 104 PID 3708 wrote to memory of 4816 3708 msdt.exe 104
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4460 -
C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:428
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3708 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PaymentConfirmation.pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4816
-
-