Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe
-
Size
224KB
-
MD5
eded69923410a35211acdf7ead546176
-
SHA1
7d7d21811770a91faf312b3d45d07a38586c6a42
-
SHA256
c75c953e098f6999fd4a1674f4fd325d538502aead639872dec4cb89ca3ffee9
-
SHA512
282c20aaee310380a5572f5eaef2fab787625637d17fda2f64d2aaa227b0d389e9eecd6efeaa1feaafed043cae176a6157d5209db79ac8faaa698a297db96e88
-
SSDEEP
3072:s3jqjLX1DLPcIMC0hrrwxJf61LUZPexcF065ocY1GNwZgKfUL5HFzk2L1xUq/ULY:sTqjFoDr8xqifSc/dQeVXL1uqeNU9Nx
Malware Config
Extracted
xloader
2.3
um8e
theypretend.com
hopeschildren.com
kuly.cloud
maniflexx.net
bedtimesocietyblog.com
spenglerwetlandpreserve.com
unity-play.net
bonap56.com
consciencevc.com
deluxeluxe.com
officialjuliep.com
cttrade.club
quietflyt.com
mcabspl.com
lippocaritahotel.com
tolanfilms.xyz
momenaagro.com
slingshotart.com
thefoundershuddle.com
mobilbaris.com
castlerockbotanicals.com
dautusim.com
tolteca.club
saddletaxweigh.info
oxydiumcorp.com
themiamadison.com
888luckys.net
brandsuggestion.com
jusdra.com
therios.net
helpushelpothersstore.com
pornometal.com
whejvrehj.com
ngzhaohern.com
slaskie.pro
heuristicadg.com
angrybird23blog.com
my-bmi.space
lufral.com
influenced-brands.com
vicdux.life
top1opp.com
techiedrill.com
sitedesing.com
bigtittylesbians.com
xspinworks14.com
alturadesingfit.com
venturivasiljevic.com
yxsj.info
yorkshirebridalmakeup.info
shopinnocenceeyejai.com
yinhangli.com
tickimumm.com
xn--939am40byoeizq.com
customerservuce.com
blendoriginal.com
freelancebizquiz.com
matjar-lik.com
bellaxxocosmetics.com
gxdazj.com
findbriefmarken.com
pubgevents1.com
metis.network
eternapure.net
jiltedowl.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2296-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2296-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2296-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2260-23-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2804 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2404 set thread context of 2296 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 31 PID 2296 set thread context of 1184 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 21 PID 2296 set thread context of 1184 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 21 PID 2260 set thread context of 1184 2260 NETSTAT.EXE 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2260 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE 2260 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 2260 NETSTAT.EXE 2260 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2296 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe Token: SeDebugPrivilege 2260 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2404 wrote to memory of 2296 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 31 PID 2404 wrote to memory of 2296 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 31 PID 2404 wrote to memory of 2296 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 31 PID 2404 wrote to memory of 2296 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 31 PID 2404 wrote to memory of 2296 2404 AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe 31 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 2260 wrote to memory of 2804 2260 NETSTAT.EXE 33 PID 2260 wrote to memory of 2804 2260 NETSTAT.EXE 33 PID 2260 wrote to memory of 2804 2260 NETSTAT.EXE 33 PID 2260 wrote to memory of 2804 2260 NETSTAT.EXE 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe"C:\Users\Admin\AppData\Local\Temp\AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe"C:\Users\Admin\AppData\Local\Temp\AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\AKG Upgrade Project HP Flare Tip 2018-08311SP-01 R1.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2804
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3