Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:01
Static task
static1
Behavioral task
behavioral1
Sample
WTS-SOA OCT21_pdf.exe
Resource
win7-20240903-en
General
-
Target
WTS-SOA OCT21_pdf.exe
-
Size
541KB
-
MD5
3591900fe0a5aa6d4aa7333dd8fa2087
-
SHA1
6ad19947aaa288adba42f0ef78da4679a713634d
-
SHA256
1dd7df2847fe97dcf3a982796de329170823badae79b8342d5180ed5a11633ba
-
SHA512
fa0cab7da77825c50dc5963d505fe7aceb8ace8f7236190086488b81643a81a6c9b156a90e8045533c421b81175dbed7d583f28d61caa144fab61e9ab350bb5a
-
SSDEEP
12288:O78H1X++lTldtyhZ1g+KqRfoCoE40BhwFpCke:t+KT6Zajcon+gpCke
Malware Config
Extracted
xloader
2.5
xc52
koebnertriangle.com
maltbahis74.com
invisionment.com
buzzcupid.com
portavellarestaurant.com
vegan-mexican.com
magotan100.com
focalpatio.com
teammissouri.club
marketplacejoy.com
cxz6.com
bettersalud.info
viesereine.net
neondashboard.com
linuxsauce.net
samuelcollie.com
lavishlylashed.net
gosseinsag.com
isaeitaly.com
mediakal-sa.net
vrindaban.xyz
cockleinn.com
massagemarkets.com
chehalishome.com
platinc.xyz
elmjad.net
lewisstaffyhome.com
snugglyprints.com
interviewtamer.com
744421.com
amartemx.com
hibatlili.com
libinyu.com
smithnetworksolutions.com
rogantools.com
motorizedtrailerdolly.com
everypick.net
ada-claim.com
gabecervantesart.com
saint444.com
sexolia.com
sadique-holdings.com
tcm-books.com
hyslim.com
hotstylemusic.net
fucksextoys.com
tenlog040.xyz
izzat.green
3939rusk.com
shitangyehua.com
chaolang34.com
coloured-by-art.com
fetarcryptoanalysis.club
horizonsmedicalgroup.com
cycleserviceindustries.com
summitslayers.com
williealvarado.com
football-transfer-news.pro
elpasotalk.com
pastasteak.online
tricor-red.net
insights4usa.com
magentahide.com
soumeijiu.com
ded5353.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2756-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2756-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2152-22-0x0000000000600000-0x0000000000629000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2444 set thread context of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 2756 set thread context of 3424 2756 WTS-SOA OCT21_pdf.exe 56 PID 2152 set thread context of 3424 2152 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language WTS-SOA OCT21_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2756 WTS-SOA OCT21_pdf.exe 2756 WTS-SOA OCT21_pdf.exe 2756 WTS-SOA OCT21_pdf.exe 2756 WTS-SOA OCT21_pdf.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe 2152 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2756 WTS-SOA OCT21_pdf.exe 2756 WTS-SOA OCT21_pdf.exe 2756 WTS-SOA OCT21_pdf.exe 2152 mstsc.exe 2152 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2756 WTS-SOA OCT21_pdf.exe Token: SeDebugPrivilege 2152 mstsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 2444 wrote to memory of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 2444 wrote to memory of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 2444 wrote to memory of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 2444 wrote to memory of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 2444 wrote to memory of 2756 2444 WTS-SOA OCT21_pdf.exe 98 PID 3424 wrote to memory of 2152 3424 Explorer.EXE 99 PID 3424 wrote to memory of 2152 3424 Explorer.EXE 99 PID 3424 wrote to memory of 2152 3424 Explorer.EXE 99 PID 2152 wrote to memory of 5108 2152 mstsc.exe 100 PID 2152 wrote to memory of 5108 2152 mstsc.exe 100 PID 2152 wrote to memory of 5108 2152 mstsc.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\WTS-SOA OCT21_pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5108
-
-