Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21/11/2024, 20:10
Static task
static1
Behavioral task
behavioral1
Sample
Remittance_Advice.exe
Resource
win7-20240903-en
General
-
Target
Remittance_Advice.exe
-
Size
379KB
-
MD5
da19ef06a39a0b1594d3b6239b5ef1ec
-
SHA1
8fefee7414e25411b6f0fd2eb66c1b7380c83c2a
-
SHA256
7f9f8cc38a55f713a4d06144cf9e9ebb7967d77aa7ed51aef8aebe70e374c489
-
SHA512
465f311067c27c87970df0bb5a315f2ae48646578567af10d7622ca756413b9392faa0b47bbfeedc66b9720b84d72b1273914e2a377f02915a7697677189ece8
-
SSDEEP
6144:MVUNLTYOapBpxKqWDaAE59TfGBw+MeYBVK0ilLlRdLvN34Q8a6:MVUVjapBpFWS9qBw+Mbk0ilLlrFca
Malware Config
Extracted
xloader
2.5
tk66
builditatlanta.com
nkrevolution.online
mgm-photography.com
g5tgbt5pro.club
lvjia.store
dealsmyweb.com
edgyveggie.biz
thereview.community
drkittipat.com
noordinaryadvice.com
radiakeep.com
hughers3.com
jewerylsh.com
willpowerleggings.com
wmxldn.top
haberinolsunmilas.com
deltamtrading.com
thegaragecloset.com
wolffsurf.com
vbitleader.com
celebertyhelicopters.com
fasa-unikin.education
aroo.xyz
ankaraninoylari.com
gumbosgeorgetown.com
citestaccnt1631566949.com
privatejetsboston.com
nosomedayinbadass.com
simplyabcbook.com
experienceanewwelcoming.com
inspiration4crypto.com
plymouthsontheway.com
logontube.com
skinlikethat.com
ecotravelway.com
drivelingo.com
kennycheng.tech
orderjoessteaks.com
thediyvegetarian.com
frituur-tpleintje.com
sabreindsustries.com
health-pro.xyz
cookinggem.com
centroeducacionalcaparao.com
yallst8.com
completehomeprotection.com
compressionsocks.pro
360metaverse.pro
rcoll-dev.com
terra-krk.com
presleysissonart.com
sahuory.com
omnisquare.net
vallvoline.com
silentpartner.plus
datarbl.com
movingcompanysatx.com
ccpdefender.com
asvsin.com
windowsfreewares.xyz
mystiagame.com
prioritymedicareadvisors.com
designedtoinspire.biz
satorisap.com
laurelmanorbistro.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/files/0x0008000000023c8e-10.dat xloader behavioral2/memory/4996-18-0x00000000007C0000-0x00000000007E9000-memory.dmp xloader behavioral2/memory/3340-23-0x00000000007B0000-0x00000000007D9000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\International\Geo\Nation Remittance_Advice.exe -
Executes dropped EXE 1 IoCs
pid Process 4996 bin.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4996 set thread context of 3440 4996 bin.exe 56 PID 3340 set thread context of 3440 3340 wlanext.exe 56 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Remittance_Advice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bin.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4996 bin.exe 4996 bin.exe 4996 bin.exe 4996 bin.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe 3340 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4996 bin.exe 4996 bin.exe 4996 bin.exe 3340 wlanext.exe 3340 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4996 bin.exe Token: SeDebugPrivilege 3340 wlanext.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2112 wrote to memory of 4996 2112 Remittance_Advice.exe 83 PID 2112 wrote to memory of 4996 2112 Remittance_Advice.exe 83 PID 2112 wrote to memory of 4996 2112 Remittance_Advice.exe 83 PID 3440 wrote to memory of 3340 3440 Explorer.EXE 84 PID 3440 wrote to memory of 3340 3440 Explorer.EXE 84 PID 3440 wrote to memory of 3340 3440 Explorer.EXE 84 PID 3340 wrote to memory of 516 3340 wlanext.exe 88 PID 3340 wrote to memory of 516 3340 wlanext.exe 88 PID 3340 wrote to memory of 516 3340 wlanext.exe 88
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Remittance_Advice.exe"C:\Users\Admin\AppData\Local\Temp\Remittance_Advice.exe"2⤵
- Checks computer location settings
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- System Location Discovery: System Language Discovery
PID:516
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
163KB
MD546a5d43160a90e7c6806e1e0ff188b40
SHA153d72e81fcc566516a332af6f52e5a8757db7f4a
SHA256c39887cba6df78d7eb18f00d70f7f1f6871dd8055e0291d4a337666346b37180
SHA5125b8d7de931b5620dff82de8bbc7adda7f4600563256c5f01db7cfcabd054605e033bd8413ef81bb9a814513459bbe9dfa99bf1152a069498cc2c986d409808db