Analysis
-
max time kernel
121s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Bridge_E12_4546786,pdf.exe
Resource
win7-20241010-en
General
-
Target
Bridge_E12_4546786,pdf.exe
-
Size
993KB
-
MD5
f9e5c9b101838927e7980b6f4892820c
-
SHA1
091c3fdf81cb7bc59d338723d9938f5506944e5a
-
SHA256
a8664e0023a7f34579fff0976b8f7d63805fbd6ef14eeebd2d0bbdf3e16e785c
-
SHA512
0f8e845c64fc2e1ada39745b80215c8203ae214b4aa29daa42c945813bddbec40a42ae296727d6718d8af22e8285b7bc81d4a99f74f51c2b6429c9d7b3536cae
-
SSDEEP
24576:ueaakkaedlGmntd9xRXhYjICRRRRRjXtAmA5ZSE:ueaakkaed0a1xRCDRRRRRjdAmA/
Malware Config
Extracted
xloader
2.3
hw6d
medicare101now.com
danahillathletics.com
realjobexpert.com
boulderhalle-hamburg.com
idoweddinghair.com
awdcompanies.com
thevillaflora.com
neutrasystems.com
allwest-originals.com
designtehengsg.com
thenewyorker.computer
ladybugtubs.com
silina-beauty24.com
mifangtu.com
fashionbranddeveloper.com
istanbulhookah.com
askyoyo.com
osaka-computer.net
conegenie.com
agteless.com
carsoncredittx.com
wellalytics.com
onjulitrading.com
thelocallawnmen.com
loanascustomboutique.com
ohcaftanmycaftan.com
ardor-fitness.com
benzinhayvancilik.com
apthaiproperty.com
maxim.technology
dfch18.com
davaoaffordablecondo.com
sueshemp.com
missmaltese.com
lakecountrydems.com
lastminuteminister.com
sofiascelebrations.com
socialaspecthouston.com
rechnung.pro
kathyscrabhouse.com
themusasoficial.com
reversemortgageloanmiami.com
vrventurebsp.com
whatalode.com
xh03.net
qiqihao.site
specstrii.com
organicfarmteam.com
codebinnovations.net
kizunaservice.com
lboclkchain.com
frorool.com
dpok.network
desafogados.com
vestblue.net
forguyshere.com
recordprosperity.info
theballoonbirds.com
adityabirla-loan.com
midgex.info
qishuxia.com
panopticop.com
gd-kangda.com
hotelbrainclub.com
werealestatephotography.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2964-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2964-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3040 set thread context of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 2964 set thread context of 1200 2964 Bridge_E12_4546786,pdf.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2944 944 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bridge_E12_4546786,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3040 Bridge_E12_4546786,pdf.exe 3040 Bridge_E12_4546786,pdf.exe 2964 Bridge_E12_4546786,pdf.exe 2964 Bridge_E12_4546786,pdf.exe -
Suspicious behavior: MapViewOfSection 3 IoCs
pid Process 2964 Bridge_E12_4546786,pdf.exe 2964 Bridge_E12_4546786,pdf.exe 2964 Bridge_E12_4546786,pdf.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 3040 Bridge_E12_4546786,pdf.exe Token: SeDebugPrivilege 2964 Bridge_E12_4546786,pdf.exe Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE Token: SeShutdownPrivilege 1200 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 3040 wrote to memory of 2964 3040 Bridge_E12_4546786,pdf.exe 31 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 1200 wrote to memory of 944 1200 Explorer.EXE 32 PID 944 wrote to memory of 2944 944 msiexec.exe 33 PID 944 wrote to memory of 2944 944 msiexec.exe 33 PID 944 wrote to memory of 2944 944 msiexec.exe 33 PID 944 wrote to memory of 2944 944 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2964
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 944 -s 2723⤵
- Program crash
PID:2944
-
-