Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:58
Static task
static1
Behavioral task
behavioral1
Sample
Bridge_E12_4546786,pdf.exe
Resource
win7-20241010-en
General
-
Target
Bridge_E12_4546786,pdf.exe
-
Size
993KB
-
MD5
f9e5c9b101838927e7980b6f4892820c
-
SHA1
091c3fdf81cb7bc59d338723d9938f5506944e5a
-
SHA256
a8664e0023a7f34579fff0976b8f7d63805fbd6ef14eeebd2d0bbdf3e16e785c
-
SHA512
0f8e845c64fc2e1ada39745b80215c8203ae214b4aa29daa42c945813bddbec40a42ae296727d6718d8af22e8285b7bc81d4a99f74f51c2b6429c9d7b3536cae
-
SSDEEP
24576:ueaakkaedlGmntd9xRXhYjICRRRRRjXtAmA5ZSE:ueaakkaed0a1xRCDRRRRRjdAmA/
Malware Config
Extracted
xloader
2.3
hw6d
medicare101now.com
danahillathletics.com
realjobexpert.com
boulderhalle-hamburg.com
idoweddinghair.com
awdcompanies.com
thevillaflora.com
neutrasystems.com
allwest-originals.com
designtehengsg.com
thenewyorker.computer
ladybugtubs.com
silina-beauty24.com
mifangtu.com
fashionbranddeveloper.com
istanbulhookah.com
askyoyo.com
osaka-computer.net
conegenie.com
agteless.com
carsoncredittx.com
wellalytics.com
onjulitrading.com
thelocallawnmen.com
loanascustomboutique.com
ohcaftanmycaftan.com
ardor-fitness.com
benzinhayvancilik.com
apthaiproperty.com
maxim.technology
dfch18.com
davaoaffordablecondo.com
sueshemp.com
missmaltese.com
lakecountrydems.com
lastminuteminister.com
sofiascelebrations.com
socialaspecthouston.com
rechnung.pro
kathyscrabhouse.com
themusasoficial.com
reversemortgageloanmiami.com
vrventurebsp.com
whatalode.com
xh03.net
qiqihao.site
specstrii.com
organicfarmteam.com
codebinnovations.net
kizunaservice.com
lboclkchain.com
frorool.com
dpok.network
desafogados.com
vestblue.net
forguyshere.com
recordprosperity.info
theballoonbirds.com
adityabirla-loan.com
midgex.info
qishuxia.com
panopticop.com
gd-kangda.com
hotelbrainclub.com
werealestatephotography.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1068-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1068-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2800-23-0x00000000012B0000-0x00000000012D9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2588 set thread context of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 1068 set thread context of 3484 1068 Bridge_E12_4546786,pdf.exe 56 PID 2800 set thread context of 3484 2800 chkdsk.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Bridge_E12_4546786,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2588 Bridge_E12_4546786,pdf.exe 2588 Bridge_E12_4546786,pdf.exe 2588 Bridge_E12_4546786,pdf.exe 2588 Bridge_E12_4546786,pdf.exe 2588 Bridge_E12_4546786,pdf.exe 1068 Bridge_E12_4546786,pdf.exe 1068 Bridge_E12_4546786,pdf.exe 1068 Bridge_E12_4546786,pdf.exe 1068 Bridge_E12_4546786,pdf.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe 2800 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1068 Bridge_E12_4546786,pdf.exe 1068 Bridge_E12_4546786,pdf.exe 1068 Bridge_E12_4546786,pdf.exe 2800 chkdsk.exe 2800 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2588 Bridge_E12_4546786,pdf.exe Token: SeDebugPrivilege 1068 Bridge_E12_4546786,pdf.exe Token: SeDebugPrivilege 2800 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4752 2588 Bridge_E12_4546786,pdf.exe 100 PID 2588 wrote to memory of 4752 2588 Bridge_E12_4546786,pdf.exe 100 PID 2588 wrote to memory of 4752 2588 Bridge_E12_4546786,pdf.exe 100 PID 2588 wrote to memory of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 2588 wrote to memory of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 2588 wrote to memory of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 2588 wrote to memory of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 2588 wrote to memory of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 2588 wrote to memory of 1068 2588 Bridge_E12_4546786,pdf.exe 101 PID 3484 wrote to memory of 2800 3484 Explorer.EXE 102 PID 3484 wrote to memory of 2800 3484 Explorer.EXE 102 PID 3484 wrote to memory of 2800 3484 Explorer.EXE 102 PID 2800 wrote to memory of 4344 2800 chkdsk.exe 103 PID 2800 wrote to memory of 4344 2800 chkdsk.exe 103 PID 2800 wrote to memory of 4344 2800 chkdsk.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3484 -
C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"3⤵PID:4752
-
-
C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1068
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Bridge_E12_4546786,pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4344
-
-