Analysis
-
max time kernel
149s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
WTS-SOA OCT21_pdf.exe
Resource
win7-20240903-en
General
-
Target
WTS-SOA OCT21_pdf.exe
-
Size
541KB
-
MD5
3591900fe0a5aa6d4aa7333dd8fa2087
-
SHA1
6ad19947aaa288adba42f0ef78da4679a713634d
-
SHA256
1dd7df2847fe97dcf3a982796de329170823badae79b8342d5180ed5a11633ba
-
SHA512
fa0cab7da77825c50dc5963d505fe7aceb8ace8f7236190086488b81643a81a6c9b156a90e8045533c421b81175dbed7d583f28d61caa144fab61e9ab350bb5a
-
SSDEEP
12288:O78H1X++lTldtyhZ1g+KqRfoCoE40BhwFpCke:t+KT6Zajcon+gpCke
Malware Config
Extracted
xloader
2.5
xc52
koebnertriangle.com
maltbahis74.com
invisionment.com
buzzcupid.com
portavellarestaurant.com
vegan-mexican.com
magotan100.com
focalpatio.com
teammissouri.club
marketplacejoy.com
cxz6.com
bettersalud.info
viesereine.net
neondashboard.com
linuxsauce.net
samuelcollie.com
lavishlylashed.net
gosseinsag.com
isaeitaly.com
mediakal-sa.net
vrindaban.xyz
cockleinn.com
massagemarkets.com
chehalishome.com
platinc.xyz
elmjad.net
lewisstaffyhome.com
snugglyprints.com
interviewtamer.com
744421.com
amartemx.com
hibatlili.com
libinyu.com
smithnetworksolutions.com
rogantools.com
motorizedtrailerdolly.com
everypick.net
ada-claim.com
gabecervantesart.com
saint444.com
sexolia.com
sadique-holdings.com
tcm-books.com
hyslim.com
hotstylemusic.net
fucksextoys.com
tenlog040.xyz
izzat.green
3939rusk.com
shitangyehua.com
chaolang34.com
coloured-by-art.com
fetarcryptoanalysis.club
horizonsmedicalgroup.com
cycleserviceindustries.com
summitslayers.com
williealvarado.com
football-transfer-news.pro
elpasotalk.com
pastasteak.online
tricor-red.net
insights4usa.com
magentahide.com
soumeijiu.com
ded5353.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2768-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2768-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2620-21-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2952 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2128 set thread context of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2768 set thread context of 1204 2768 WTS-SOA OCT21_pdf.exe 21 PID 2620 set thread context of 1204 2620 svchost.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WTS-SOA OCT21_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2768 WTS-SOA OCT21_pdf.exe 2768 WTS-SOA OCT21_pdf.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe 2620 svchost.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2768 WTS-SOA OCT21_pdf.exe 2768 WTS-SOA OCT21_pdf.exe 2768 WTS-SOA OCT21_pdf.exe 2620 svchost.exe 2620 svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2768 WTS-SOA OCT21_pdf.exe Token: SeDebugPrivilege 2620 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 2128 wrote to memory of 2768 2128 WTS-SOA OCT21_pdf.exe 31 PID 1204 wrote to memory of 2620 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2620 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2620 1204 Explorer.EXE 32 PID 1204 wrote to memory of 2620 1204 Explorer.EXE 32 PID 2620 wrote to memory of 2952 2620 svchost.exe 33 PID 2620 wrote to memory of 2952 2620 svchost.exe 33 PID 2620 wrote to memory of 2952 2620 svchost.exe 33 PID 2620 wrote to memory of 2952 2620 svchost.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\SysWOW64\svchost.exe"C:\Windows\SysWOW64\svchost.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2952
-
-