Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe
Resource
win7-20241010-en
General
-
Target
An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe
-
Size
706KB
-
MD5
16d5446ad4d79662113a4e8a669b896d
-
SHA1
dbe94c4fa5e7eda91e40480a8ce4d6ac5638b8a7
-
SHA256
d55802936c5be4116efa2f7e18a019c1adbcd8cc7c8e9682eb3f4ae5bb3f8da8
-
SHA512
3463d75a008ba0db42b28d0f1493efa1f740a8bb0982db1ad348ed61d4035e15313b2df0b0989f108c8fd20c5745120421eed9508a6b7ca3fe3e8b93957d8835
-
SSDEEP
12288:Q5oWJlP2jj5HxpyxL1D3pQKfK/aoppiyJ5bLBnB6w6:Q5oWJgj1a1DZQKupLNBBY
Malware Config
Extracted
xloader
2.6
kije
apyturkey.com
mgthehandyman.com
dick-kick.com
burntflare.com
amsecvault-services.com
moot-art.com
podemosleer.com
you-success.online
delbellointerior.com
polleriabrujas.xyz
yorkingmoroow.com
songlong8833.com
562erf.com
dhozeaccesorios.com
citychurchlloyd.com
rift-ralley.com
healsbox.com
domaindonuts.com
elversonpet.supply
texasmr.com
oibtt009.xyz
inspiresdlifecoach.com
hostcam.net
crawfishworld.net
bleep.zone
unheardlife.com
kickknock.xyz
influencertopia.com
ethereumdex.xyz
pafc.football
onda-verde.com
supernaturalartanddesign.com
shimpiyt.online
tgnminecraft.com
craftyniftythrifty.com
kamiita-s.com
adonisayurveda.com
peerfect.solutions
wallet-paligyein.technology
brus.one
cicyber.net
zjtoyaz.com
residences-rosewood-miami.com
icebeans.net
expertdieselrepair.com
xn--seotikmb-rx0db.com
kongomobile.com
24-7tanning.com
jrsfarmpart.com
rodnree.com
travelsagas.com
bossistanbul34.com
sbcountywineguide.com
en-bitmex.com
liverpoolcenter.com
lolita123.com
affairtium.com
ms-lab.one
mainepropertysearch.net
ceco-base.com
lukegrandview.com
buysupezrilla.com
sharsthetics.com
pylcmy.com
nordfeet.store
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/536-12-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/536-16-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/2724-23-0x0000000000130000-0x000000000015B000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2544 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1268 set thread context of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 536 set thread context of 1192 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 20 PID 2724 set thread context of 1192 2724 wuapp.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wuapp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe 2724 wuapp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 2724 wuapp.exe 2724 wuapp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 536 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe Token: SeDebugPrivilege 2724 wuapp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1268 wrote to memory of 536 1268 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 29 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2724 1192 Explorer.EXE 30 PID 2724 wrote to memory of 2544 2724 wuapp.exe 31 PID 2724 wrote to memory of 2544 2724 wuapp.exe 31 PID 2724 wrote to memory of 2544 2724 wuapp.exe 31 PID 2724 wrote to memory of 2544 2724 wuapp.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:536
-
-
-
C:\Windows\SysWOW64\wuapp.exe"C:\Windows\SysWOW64\wuapp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2544
-
-