Overview
overview
10Static
static
319979.exe
windows7-x64
1019979.exe
windows10-2004-x64
10Factura_855.pdf.exe
windows7-x64
10Factura_855.pdf.exe
windows10-2004-x64
7qfmjhb.exe
windows7-x64
3qfmjhb.exe
windows10-2004-x64
3Fattura_855.pdf.exe
windows7-x64
10Fattura_855.pdf.exe
windows10-2004-x64
7gocbcx.exe
windows7-x64
3gocbcx.exe
windows10-2004-x64
3IoC/MIL000...0.xlsm
windows7-x64
3IoC/MIL000...0.xlsm
windows10-2004-x64
1IoC/PO.xlsx
windows7-x64
8IoC/PO.xlsx
windows10-2004-x64
1PO_2022-04-33981.exe
windows7-x64
3PO_2022-04-33981.exe
windows10-2004-x64
10IoC/Pagamento.xlsx
windows7-x64
8IoC/Pagamento.xlsx
windows10-2004-x64
1IoC/SHIPPI...TS.rtf
windows7-x64
8IoC/SHIPPI...TS.rtf
windows10-2004-x64
3SMK_29082022.exe
windows7-x64
10SMK_29082022.exe
windows10-2004-x64
10$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Analysis
-
max time kernel
149s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
19979.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
19979.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Factura_855.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Factura_855.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
qfmjhb.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
qfmjhb.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Fattura_855.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Fattura_855.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
gocbcx.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
gocbcx.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
IoC/MIL0000640730.xlsm
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
IoC/MIL0000640730.xlsm
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
IoC/PO.xlsx
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
IoC/PO.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
PO_2022-04-33981.exe
Resource
win7-20241010-en
Behavioral task
behavioral16
Sample
PO_2022-04-33981.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
IoC/Pagamento.xlsx
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
IoC/Pagamento.xlsx
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
IoC/SHIPPING DOCUMENTS.rtf
Resource
win7-20240903-en
Behavioral task
behavioral20
Sample
IoC/SHIPPING DOCUMENTS.rtf
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
SMK_29082022.exe
Resource
win7-20240903-en
Behavioral task
behavioral22
Sample
SMK_29082022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
19979.exe
-
Size
630KB
-
MD5
1c41d0198adc92df0a83e60c27c76c78
-
SHA1
689aa46c42c440b86e7a11a18bca0c4c6afd9c0e
-
SHA256
6ff40b2ed84520e3135881c7a31a49f2a0952e1ed7a9739527b1619bcb6ec8f8
-
SHA512
f2e562a2d7f916587f5ac71efe34ad431ae45632080d7e9f3cd3108f7b5afd23fb473b3bda3577eaa4b0570c4a8969c124398da0997a6a04597c3396137924c5
-
SSDEEP
12288:xnZHHEPo3PUuUSc6AdkuqV3wuEW2ypRxRWj:xZnEPonoawe2yVRS
Malware Config
Extracted
xloader
2.5
nd04
picsedits.com
ceinpsico.com
151motors.com
rollingstrollers.com
yonghengwenhua.store
thesortinghouse3j.com
piboise.com
xgdfjm.com
icloud-verify.com
exeterloftrefurbishments.com
kascae.biz
mujeresimparablesterramar.com
samsungcorporate.com
journee2sobriety.com
quanqiu00000.com
gigharborapartment.com
spacdesignerhomes.online
alcantaraleiloes.com
gibbsrecordingco.com
aftermarketbiz.com
pynch3.com
helloboy.xyz
piao168888888.com
janwaandersphotography.com
relianceroofsnashville.com
abtransportes.com
ipwemeta.com
hhkjy.com
shermancountryfest.com
spadeexchangeco.com
savewousa.com
interholding.company
pittboss-bbq.one
cochildprotect.com
watson-lane.com
huibao5.com
detonsipro.xyz
fascialboost.com
sorialab10.online
buggy4t.com
wearethecardclinics.com
kalpeshvasoya.com
solideo.clinic
gothamstone.store
nfaabv.website
fuyi006.com
wearenow.store
xrez.online
bethpaqefcu.com
nft4e4654.com
streamline-automotive.com
compareyoursneakers.online
top10vps.xyz
videostoreclub.xyz
lacorreo.com
ryaneardley.com
forgood.group
gjjcjs.com
studiodannadesign.com
onlinemaejang.com
motiondesign.ltd
thanosstudio.com
margondo.com
worldwidegoodscarrier.com
beaconhillchurchseattle.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2524-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2524-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2900-24-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2572 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
19979.exe19979.execolorcpl.exedescription pid process target process PID 2060 set thread context of 2524 2060 19979.exe 19979.exe PID 2524 set thread context of 1208 2524 19979.exe Explorer.EXE PID 2900 set thread context of 1208 2900 colorcpl.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
19979.execolorcpl.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 19979.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
19979.execolorcpl.exepid process 2524 19979.exe 2524 19979.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe 2900 colorcpl.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
19979.execolorcpl.exepid process 2524 19979.exe 2524 19979.exe 2524 19979.exe 2900 colorcpl.exe 2900 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
19979.execolorcpl.exedescription pid process Token: SeDebugPrivilege 2524 19979.exe Token: SeDebugPrivilege 2900 colorcpl.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
19979.exeExplorer.EXEcolorcpl.exedescription pid process target process PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 2060 wrote to memory of 2524 2060 19979.exe 19979.exe PID 1208 wrote to memory of 2900 1208 Explorer.EXE colorcpl.exe PID 1208 wrote to memory of 2900 1208 Explorer.EXE colorcpl.exe PID 1208 wrote to memory of 2900 1208 Explorer.EXE colorcpl.exe PID 1208 wrote to memory of 2900 1208 Explorer.EXE colorcpl.exe PID 2900 wrote to memory of 2572 2900 colorcpl.exe cmd.exe PID 2900 wrote to memory of 2572 2900 colorcpl.exe cmd.exe PID 2900 wrote to memory of 2572 2900 colorcpl.exe cmd.exe PID 2900 wrote to memory of 2572 2900 colorcpl.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\19979.exe"C:\Users\Admin\AppData\Local\Temp\19979.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\19979.exe"C:\Users\Admin\AppData\Local\Temp\19979.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2524
-
-
-
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\19979.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2572
-
-