Analysis
-
max time kernel
120s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:09
Static task
static1
Behavioral task
behavioral1
Sample
scan_21000075656119_pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
scan_21000075656119_pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/wxmw.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/wxmw.dll
Resource
win10v2004-20241007-en
General
-
Target
scan_21000075656119_pdf.exe
-
Size
434KB
-
MD5
73471ec476c4a9840e7a5a016cbccf15
-
SHA1
e756222389add5c0bf2b76879071b64a47d2b811
-
SHA256
4c5b9ebac3175e087db4da64b7a7947ab4d49a5177c0549419a18ab9f58e5900
-
SHA512
5c0fbac272c5208712b836b9bfb2f4b54e73032f32119ff9ba81f8ade7839500157e5a1ae955a968325e7ded4eeffb57fb74f30e92ed1958315d035138590564
-
SSDEEP
12288:fEAmDWlGbc9ZqCsVVg87u4TlG6lic+spEz7Ujy:ffltP0Vg87lN/+1zMy
Malware Config
Extracted
xloader
2.5
teni
amage.agency
hagenoblog.com
34pibei.com
zhizhuotec.com
gogetemm.com
bibopay.net
avixioner.com
czbpw.com
homesearch-wa.com
indevmobility.biz
theandrewjbradymusiccenter.com
mpcznm.com
outdoorgaloreandmore.com
xrqesoxxjzqh.mobi
thgn10.xyz
john-erickson.com
mindhak.com
liphost.com
bailbondsvegas.net
mekancard.com
jk-ask.com
thegamegrimoire.com
texastuffdumpsters.com
zjtvy.com
celestecassidy.com
baipees.com
ingridbianco.com
resolutiontaxinc.com
heiblock.xyz
knowledgeable.design
boatersmarine.supply
theprofits.store
ecareerintogear.com
wyatt.energy
vatgia9.com
betrothaldating.com
marika-christ.biz
seowongoopain.com
backdad.com
soulivre.net
835651.com
edukado.online
aoxminfqsftc.mobi
groupetdl.com
axmclean.com
lampaou.com
profit-fx.com
gumushost.com
okinawa-miyako-ma.com
high-definition-tv.com
herbertkjimenez.store
promo-giveaway.com
sutnsdmxq.icu
imperocrypto.com
satnamaste.com
salesbycengizkhan.com
xiaochaoshi.xyz
amazonretailbrickandmotar.net
stratumpor.xyz
piximos.com
ofestlager.com
alsafabakersrestaurant.com
sharon-tv.online
lockdown432.com
xriddler.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2940-9-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/2940-11-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/2940-12-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral1/memory/2940-13-0x0000000002070000-0x0000000002099000-memory.dmp xloader -
Loads dropped DLL 1 IoCs
pid Process 1936 scan_21000075656119_pdf.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1936 set thread context of 2940 1936 scan_21000075656119_pdf.exe 30 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2292 2940 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan_21000075656119_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scan_21000075656119_pdf.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 1936 wrote to memory of 2940 1936 scan_21000075656119_pdf.exe 30 PID 2940 wrote to memory of 2292 2940 scan_21000075656119_pdf.exe 31 PID 2940 wrote to memory of 2292 2940 scan_21000075656119_pdf.exe 31 PID 2940 wrote to memory of 2292 2940 scan_21000075656119_pdf.exe 31 PID 2940 wrote to memory of 2292 2940 scan_21000075656119_pdf.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\scan_21000075656119_pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan_21000075656119_pdf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Users\Admin\AppData\Local\Temp\scan_21000075656119_pdf.exe"C:\Users\Admin\AppData\Local\Temp\scan_21000075656119_pdf.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 5083⤵
- Program crash
PID:2292
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5471f793e5ad2693cbe1c535a5eeaefd3
SHA113eb77948aeb666746294efe53e5f43164a7493f
SHA256b259ba371a469f843799bd7bdf64bc55182b941033600d1bdf7d7c3fce6e7239
SHA512ee209c33cc7837a7bfd1714b0f55d5fc5e4a75f696398ea5994d9b3e68f28f2fc0f646155feacd43704208aab78bb228e309e5e9646930241f11a199157ffd90