Analysis
-
max time kernel
149s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe
Resource
win7-20241010-en
General
-
Target
An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe
-
Size
706KB
-
MD5
16d5446ad4d79662113a4e8a669b896d
-
SHA1
dbe94c4fa5e7eda91e40480a8ce4d6ac5638b8a7
-
SHA256
d55802936c5be4116efa2f7e18a019c1adbcd8cc7c8e9682eb3f4ae5bb3f8da8
-
SHA512
3463d75a008ba0db42b28d0f1493efa1f740a8bb0982db1ad348ed61d4035e15313b2df0b0989f108c8fd20c5745120421eed9508a6b7ca3fe3e8b93957d8835
-
SSDEEP
12288:Q5oWJlP2jj5HxpyxL1D3pQKfK/aoppiyJ5bLBnB6w6:Q5oWJgj1a1DZQKupLNBBY
Malware Config
Extracted
xloader
2.6
kije
apyturkey.com
mgthehandyman.com
dick-kick.com
burntflare.com
amsecvault-services.com
moot-art.com
podemosleer.com
you-success.online
delbellointerior.com
polleriabrujas.xyz
yorkingmoroow.com
songlong8833.com
562erf.com
dhozeaccesorios.com
citychurchlloyd.com
rift-ralley.com
healsbox.com
domaindonuts.com
elversonpet.supply
texasmr.com
oibtt009.xyz
inspiresdlifecoach.com
hostcam.net
crawfishworld.net
bleep.zone
unheardlife.com
kickknock.xyz
influencertopia.com
ethereumdex.xyz
pafc.football
onda-verde.com
supernaturalartanddesign.com
shimpiyt.online
tgnminecraft.com
craftyniftythrifty.com
kamiita-s.com
adonisayurveda.com
peerfect.solutions
wallet-paligyein.technology
brus.one
cicyber.net
zjtoyaz.com
residences-rosewood-miami.com
icebeans.net
expertdieselrepair.com
xn--seotikmb-rx0db.com
kongomobile.com
24-7tanning.com
jrsfarmpart.com
rodnree.com
travelsagas.com
bossistanbul34.com
sbcountywineguide.com
en-bitmex.com
liverpoolcenter.com
lolita123.com
affairtium.com
ms-lab.one
mainepropertysearch.net
ceco-base.com
lukegrandview.com
buysupezrilla.com
sharsthetics.com
pylcmy.com
nordfeet.store
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1308-13-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/1308-18-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/1308-22-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/1020-29-0x0000000000390000-0x00000000003BB000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3140 set thread context of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 1308 set thread context of 3356 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 55 PID 1308 set thread context of 3356 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 55 PID 1020 set thread context of 3356 1020 raserver.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language raserver.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe 1020 raserver.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 1020 raserver.exe 1020 raserver.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1308 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe Token: SeDebugPrivilege 1020 raserver.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3140 wrote to memory of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 3140 wrote to memory of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 3140 wrote to memory of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 3140 wrote to memory of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 3140 wrote to memory of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 3140 wrote to memory of 1308 3140 An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe 91 PID 3356 wrote to memory of 1020 3356 Explorer.EXE 92 PID 3356 wrote to memory of 1020 3356 Explorer.EXE 92 PID 3356 wrote to memory of 1020 3356 Explorer.EXE 92 PID 1020 wrote to memory of 1364 1020 raserver.exe 93 PID 1020 wrote to memory of 1364 1020 raserver.exe 93 PID 1020 wrote to memory of 1364 1020 raserver.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3140 -
C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1308
-
-
-
C:\Windows\SysWOW64\raserver.exe"C:\Windows\SysWOW64\raserver.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1020 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\An Urgent-Enquiry-for-quotaion-Petrogas Agencies Power Plant Project Abu Dhabi-47574.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1364
-
-