Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240903-en
General
-
Target
Purchase Order.exe
-
Size
746KB
-
MD5
fc644e1753c0f510615c969a037a53df
-
SHA1
594cf60d934b1aa008a24608f2aa781238d5bf52
-
SHA256
766f746c512714ce38f8d0d43f7a0aba6fee673b77211c11542f5133ff25ead0
-
SHA512
0d5ebc07a9614ac71a5189fee599d4ee8b05603ec8eecb06a6c30b723f8173df9b0b096ec2f1ce68d510422089a369b1713f1589600a47877edccfb0417c11df
-
SSDEEP
12288:Dj/+raF5JN45uvfRqCdXb6GYkExocVDKl4IVBzI9bH1FCDtWHmawPuvnCuxFn+CO:DjW23J59dXb6zBxocVmP89jq
Malware Config
Extracted
xloader
2.5
how6
wealthcabana.com
fourfortyfourcreations.com
cqqcsy.com
bhwzjd.com
niftyfashionrewards.com
andersongiftemporium.com
smarttradingcoin.com
ilarealty.com
sherrywine.net
fsecg.info
xoti.top
pirosconsulting.com
fundapie.com
bbgm4egda.xyz
legalfortmyers.com
improvizy.com
yxdyhs.com
lucky2balls.com
panelmall.com
davenportkartway.com
springfieldlottery.com
pentagonpublishers.com
icanmakeyoufamous.com
40m2k.com
projectcentered.com
webfactory.agency
metronixmedical.com
dalingtao.xyz
functionalsoft.com
klopert77.com
cortepuroiberico.com
viavelleiloes.online
bamedia.online
skolicalunjo.com
kayhardy.com
excellentappraisers.com
sademakale.com
zbycsb.com
empirejewelss.com
coached.info
20215414.online
dazzlehide.com
swickstyle.com
specialtyplastics.online
noordinarysenior.com
bluinfo.digital
chuxiaoxin.xyz
adwin-estate.com
girlwithaglow.com
auctions.email
topekasecurestorage.com
mountain-chicken.com
lhdtrj.com
mhtqph.club
solatopotato.com
mecitiris.com
hotrodathangtrungquoc.com
gapteknews.com
mantraexchange.online
cinematiccarpenter.com
wozka.xyz
car-tech.tech
jssatchell.media
joyokanji-cheer.com
floridanratraining.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2340-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2340-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2860-24-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2724 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2100 set thread context of 2340 2100 Purchase Order.exe 31 PID 2340 set thread context of 1192 2340 Purchase Order.exe 21 PID 2860 set thread context of 1192 2860 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 2340 Purchase Order.exe 2340 Purchase Order.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe 2860 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2340 Purchase Order.exe 2340 Purchase Order.exe 2340 Purchase Order.exe 2860 wscript.exe 2860 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2340 Purchase Order.exe Token: SeDebugPrivilege 2860 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 2100 wrote to memory of 2340 2100 Purchase Order.exe 31 PID 1192 wrote to memory of 2860 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2860 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2860 1192 Explorer.EXE 32 PID 1192 wrote to memory of 2860 1192 Explorer.EXE 32 PID 2860 wrote to memory of 2724 2860 wscript.exe 33 PID 2860 wrote to memory of 2724 2860 wscript.exe 33 PID 2860 wrote to memory of 2724 2860 wscript.exe 33 PID 2860 wrote to memory of 2724 2860 wscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2340
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2724
-
-