Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:07
Static task
static1
Behavioral task
behavioral1
Sample
Request For Quotation.exe
Resource
win7-20241010-en
General
-
Target
Request For Quotation.exe
-
Size
331KB
-
MD5
824129b9207a65188202904e49a0c7e2
-
SHA1
ed5f3aaaaa71b0f420307b0e056602060747c26e
-
SHA256
076951d55cc7d2bb25fe038497044c8743acc25898b7fde670c5da27d1a52cb4
-
SHA512
5061824f3bc92b5f4bb8a3d00b9a4f2477a700352ec36bd53c54879eb648259f556830933560164c4c3d27eaa8d8a22dc78fea93cecd3e89d082cedfb7cc2ce5
-
SSDEEP
6144:cGDpD9ffUdKRAzuVNJnFPcUJZPyjkZpmJNatj4GldOFZYf7foJRRQ5xB8Sl1gcAN:XDDfCKRyS/FPXFyYuJ0V4Gl1WRWvjJEf
Malware Config
Extracted
xloader
2.5
g53s
kosnac.com
tujaso.com
handmadealtrimenti.com
txclaimsguy.com
newonedrivedocc.com
11t.xyz
shawnliang.tech
worldigger.com
lesgitar.online
winlanddepot.xyz
mofangxx.store
8ls-world.com
localrelics.com
piccadeliquickup.com
rhinogroup.online
hxrhorend.quest
avtfitness.com
oakabbey.net
presox.com
bluegreendi.com
noonshop72.com
terkyz.xyz
aerialnft.xyz
alskdfalskdf.com
kocaeli-digital.com
cerulean.media
sakthiadvancesystems.com
avielman.com
thechicentrepreneur.com
doralgomed.com
warehamcrossings.com
scotsafealarms.com
524571.com
shoppernft.com
narrativecontracting.com
bakirciticaret.com
moneythrust.com
hackthework.com
goldenversatility.com
mgav13.xyz
dp1game.com
rockalps.com
pinmagix.com
santahat.party
stoneequiprnent.com
qarandhis.com
moussevision.com
darlingdesignstore.com
gemutlichkeit.info
j497.com
pitch9.com
codingismining.com
dtmcard.com
fellasies.com
djdidinooeijduuji.com
freayabnnd.com
gaalli.xyz
mnselfservice.com
dkaobrand.com
tactical-resiliency.com
daltem.com
c23spfx.com
shopbonnetsbybri.com
xana-ana.com
anysignals.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4556-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4556-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4128-22-0x0000000000420000-0x0000000000449000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3672 set thread context of 4556 3672 Request For Quotation.exe 99 PID 4556 set thread context of 3452 4556 Request For Quotation.exe 56 PID 4128 set thread context of 3452 4128 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Request For Quotation.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 3672 Request For Quotation.exe 3672 Request For Quotation.exe 3672 Request For Quotation.exe 3672 Request For Quotation.exe 3672 Request For Quotation.exe 3672 Request For Quotation.exe 4556 Request For Quotation.exe 4556 Request For Quotation.exe 4556 Request For Quotation.exe 4556 Request For Quotation.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe 4128 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4556 Request For Quotation.exe 4556 Request For Quotation.exe 4556 Request For Quotation.exe 4128 mstsc.exe 4128 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3672 Request For Quotation.exe Token: SeDebugPrivilege 4556 Request For Quotation.exe Token: SeDebugPrivilege 4128 mstsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3672 wrote to memory of 4556 3672 Request For Quotation.exe 99 PID 3672 wrote to memory of 4556 3672 Request For Quotation.exe 99 PID 3672 wrote to memory of 4556 3672 Request For Quotation.exe 99 PID 3672 wrote to memory of 4556 3672 Request For Quotation.exe 99 PID 3672 wrote to memory of 4556 3672 Request For Quotation.exe 99 PID 3672 wrote to memory of 4556 3672 Request For Quotation.exe 99 PID 3452 wrote to memory of 4128 3452 Explorer.EXE 100 PID 3452 wrote to memory of 4128 3452 Explorer.EXE 100 PID 3452 wrote to memory of 4128 3452 Explorer.EXE 100 PID 4128 wrote to memory of 4544 4128 mstsc.exe 101 PID 4128 wrote to memory of 4544 4128 mstsc.exe 101 PID 4128 wrote to memory of 4544 4128 mstsc.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4128 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Request For Quotation.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4544
-
-