Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT.exe
Resource
win7-20240903-en
General
-
Target
PAYMENT.exe
-
Size
753KB
-
MD5
dceac041ccf4756470e11a7cf926f060
-
SHA1
3f887b2125c55ddb0b4dcfe4b49b9bf7f0271510
-
SHA256
1def824855543f8011e65445f549f01648856e222215078ebc99281415bc1268
-
SHA512
06ecd9b19fc3b1a7fdb6a621b9219407c3512330ccb0c405157373b64675ffa4c6d9e2ebacf2440b3ae6c6bceec24b0331d645961b1fb846d246486d42d14b7b
-
SSDEEP
12288:cetA1TrromUStJaIYZULyQHFoeqYsTFop4Cd1k4ONdL38arAbNjsyaUVKnp:7IHL72DNTUvkHb0zahp
Malware Config
Extracted
xloader
2.3
f4ut
studiokventura.com
rmnslashes.com
oklahomapropertybuyersllc.com
pmfce.net
yingkuncy.com
theailearning.com
artistic1cleaning.com
shqinyue.com
dentaldunya.com
karatuhotel.com
renttoownhomephoenix.com
0087wt.com
hotelsearchkwnet.com
dentavangart.com
98700l.com
seattleproducecompany.com
magicparadigm.com
cunix88.com
vr646.com
calmonleiloes.com
wuzhixuan.net
japhetsaysautomate.com
coolsday.com
17wsf.net
miami-dolphins.club
hypercars24.com
realdealryan.com
xboxscuf.com
thehawaiirealestateguy.com
upscalesociete.com
divyendujha.com
itapooloseoje.com
thesublimationsuperstore.com
artiflair.net
cunha.club
frichickspk.com
postworldwide.com
xn--vinkleskab-3cb.info
kimmchidesign.com
asapinclink.com
vidacsa.com
caspian24.com
nirvananailzplusnailsbymona.com
supng.com
seed.realty
grapheneventures.net
wondershareuniconverter.com
lngstorage.net
swiftsymphony.com
khgf.net
revendas.online
danisdiet.com
reenelectric.com
blacksheepmountaingourmet.com
mitrakemas.com
shadingconsultancy.com
walbrealtor.com
kantiemedicare.net
donatetomikepompeo.com
peiqifei.com
divinehoneybeauty.com
alruha.com
c2eat.com
cherylhuff.com
celebritymist.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/5000-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/5000-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1628-23-0x0000000000A30000-0x0000000000A59000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3668 set thread context of 5000 3668 PAYMENT.exe 98 PID 5000 set thread context of 3488 5000 PAYMENT.exe 56 PID 1628 set thread context of 3488 1628 ipconfig.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PAYMENT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1628 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 5000 PAYMENT.exe 5000 PAYMENT.exe 5000 PAYMENT.exe 5000 PAYMENT.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe 1628 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 5000 PAYMENT.exe 5000 PAYMENT.exe 5000 PAYMENT.exe 1628 ipconfig.exe 1628 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 5000 PAYMENT.exe Token: SeDebugPrivilege 1628 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3668 wrote to memory of 5000 3668 PAYMENT.exe 98 PID 3668 wrote to memory of 5000 3668 PAYMENT.exe 98 PID 3668 wrote to memory of 5000 3668 PAYMENT.exe 98 PID 3668 wrote to memory of 5000 3668 PAYMENT.exe 98 PID 3668 wrote to memory of 5000 3668 PAYMENT.exe 98 PID 3668 wrote to memory of 5000 3668 PAYMENT.exe 98 PID 3488 wrote to memory of 1628 3488 Explorer.EXE 100 PID 3488 wrote to memory of 1628 3488 Explorer.EXE 100 PID 3488 wrote to memory of 1628 3488 Explorer.EXE 100 PID 1628 wrote to memory of 3684 1628 ipconfig.exe 101 PID 1628 wrote to memory of 3684 1628 ipconfig.exe 101 PID 1628 wrote to memory of 3684 1628 ipconfig.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:5000
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3912
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3684
-
-