Analysis
-
max time kernel
146s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation.exe
Resource
win7-20241010-en
General
-
Target
Request For Quotation.exe
-
Size
331KB
-
MD5
824129b9207a65188202904e49a0c7e2
-
SHA1
ed5f3aaaaa71b0f420307b0e056602060747c26e
-
SHA256
076951d55cc7d2bb25fe038497044c8743acc25898b7fde670c5da27d1a52cb4
-
SHA512
5061824f3bc92b5f4bb8a3d00b9a4f2477a700352ec36bd53c54879eb648259f556830933560164c4c3d27eaa8d8a22dc78fea93cecd3e89d082cedfb7cc2ce5
-
SSDEEP
6144:cGDpD9ffUdKRAzuVNJnFPcUJZPyjkZpmJNatj4GldOFZYf7foJRRQ5xB8Sl1gcAN:XDDfCKRyS/FPXFyYuJ0V4Gl1WRWvjJEf
Malware Config
Extracted
xloader
2.5
g53s
kosnac.com
tujaso.com
handmadealtrimenti.com
txclaimsguy.com
newonedrivedocc.com
11t.xyz
shawnliang.tech
worldigger.com
lesgitar.online
winlanddepot.xyz
mofangxx.store
8ls-world.com
localrelics.com
piccadeliquickup.com
rhinogroup.online
hxrhorend.quest
avtfitness.com
oakabbey.net
presox.com
bluegreendi.com
noonshop72.com
terkyz.xyz
aerialnft.xyz
alskdfalskdf.com
kocaeli-digital.com
cerulean.media
sakthiadvancesystems.com
avielman.com
thechicentrepreneur.com
doralgomed.com
warehamcrossings.com
scotsafealarms.com
524571.com
shoppernft.com
narrativecontracting.com
bakirciticaret.com
moneythrust.com
hackthework.com
goldenversatility.com
mgav13.xyz
dp1game.com
rockalps.com
pinmagix.com
santahat.party
stoneequiprnent.com
qarandhis.com
moussevision.com
darlingdesignstore.com
gemutlichkeit.info
j497.com
pitch9.com
codingismining.com
dtmcard.com
fellasies.com
djdidinooeijduuji.com
freayabnnd.com
gaalli.xyz
mnselfservice.com
dkaobrand.com
tactical-resiliency.com
daltem.com
c23spfx.com
shopbonnetsbybri.com
xana-ana.com
anysignals.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/3032-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3032-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2728-23-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2616 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 392 set thread context of 3032 392 Request For Quotation.exe 29 PID 3032 set thread context of 1360 3032 Request For Quotation.exe 20 PID 2728 set thread context of 1360 2728 cmd.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request For Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 392 Request For Quotation.exe 392 Request For Quotation.exe 392 Request For Quotation.exe 392 Request For Quotation.exe 392 Request For Quotation.exe 392 Request For Quotation.exe 392 Request For Quotation.exe 3032 Request For Quotation.exe 3032 Request For Quotation.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe 2728 cmd.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3032 Request For Quotation.exe 3032 Request For Quotation.exe 3032 Request For Quotation.exe 2728 cmd.exe 2728 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 392 Request For Quotation.exe Token: SeDebugPrivilege 3032 Request For Quotation.exe Token: SeDebugPrivilege 2728 cmd.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 392 wrote to memory of 3032 392 Request For Quotation.exe 29 PID 1360 wrote to memory of 2728 1360 Explorer.EXE 30 PID 1360 wrote to memory of 2728 1360 Explorer.EXE 30 PID 1360 wrote to memory of 2728 1360 Explorer.EXE 30 PID 1360 wrote to memory of 2728 1360 Explorer.EXE 30 PID 2728 wrote to memory of 2616 2728 cmd.exe 31 PID 2728 wrote to memory of 2616 2728 cmd.exe 31 PID 2728 wrote to memory of 2616 2728 cmd.exe 31 PID 2728 wrote to memory of 2616 2728 cmd.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2616
-
-