Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
Purchase Order.exe
Resource
win7-20240903-en
General
-
Target
Purchase Order.exe
-
Size
746KB
-
MD5
fc644e1753c0f510615c969a037a53df
-
SHA1
594cf60d934b1aa008a24608f2aa781238d5bf52
-
SHA256
766f746c512714ce38f8d0d43f7a0aba6fee673b77211c11542f5133ff25ead0
-
SHA512
0d5ebc07a9614ac71a5189fee599d4ee8b05603ec8eecb06a6c30b723f8173df9b0b096ec2f1ce68d510422089a369b1713f1589600a47877edccfb0417c11df
-
SSDEEP
12288:Dj/+raF5JN45uvfRqCdXb6GYkExocVDKl4IVBzI9bH1FCDtWHmawPuvnCuxFn+CO:DjW23J59dXb6zBxocVmP89jq
Malware Config
Extracted
xloader
2.5
how6
wealthcabana.com
fourfortyfourcreations.com
cqqcsy.com
bhwzjd.com
niftyfashionrewards.com
andersongiftemporium.com
smarttradingcoin.com
ilarealty.com
sherrywine.net
fsecg.info
xoti.top
pirosconsulting.com
fundapie.com
bbgm4egda.xyz
legalfortmyers.com
improvizy.com
yxdyhs.com
lucky2balls.com
panelmall.com
davenportkartway.com
springfieldlottery.com
pentagonpublishers.com
icanmakeyoufamous.com
40m2k.com
projectcentered.com
webfactory.agency
metronixmedical.com
dalingtao.xyz
functionalsoft.com
klopert77.com
cortepuroiberico.com
viavelleiloes.online
bamedia.online
skolicalunjo.com
kayhardy.com
excellentappraisers.com
sademakale.com
zbycsb.com
empirejewelss.com
coached.info
20215414.online
dazzlehide.com
swickstyle.com
specialtyplastics.online
noordinarysenior.com
bluinfo.digital
chuxiaoxin.xyz
adwin-estate.com
girlwithaglow.com
auctions.email
topekasecurestorage.com
mountain-chicken.com
lhdtrj.com
mhtqph.club
solatopotato.com
mecitiris.com
hotrodathangtrungquoc.com
gapteknews.com
mantraexchange.online
cinematiccarpenter.com
wozka.xyz
car-tech.tech
jssatchell.media
joyokanji-cheer.com
floridanratraining.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/1288-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1288-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2628-24-0x00000000008F0000-0x0000000000919000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3124 set thread context of 1288 3124 Purchase Order.exe 91 PID 1288 set thread context of 3560 1288 Purchase Order.exe 56 PID 2628 set thread context of 3560 2628 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 50 IoCs
pid Process 1288 Purchase Order.exe 1288 Purchase Order.exe 1288 Purchase Order.exe 1288 Purchase Order.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe 2628 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1288 Purchase Order.exe 1288 Purchase Order.exe 1288 Purchase Order.exe 2628 rundll32.exe 2628 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1288 Purchase Order.exe Token: SeDebugPrivilege 2628 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3124 wrote to memory of 1288 3124 Purchase Order.exe 91 PID 3124 wrote to memory of 1288 3124 Purchase Order.exe 91 PID 3124 wrote to memory of 1288 3124 Purchase Order.exe 91 PID 3124 wrote to memory of 1288 3124 Purchase Order.exe 91 PID 3124 wrote to memory of 1288 3124 Purchase Order.exe 91 PID 3124 wrote to memory of 1288 3124 Purchase Order.exe 91 PID 3560 wrote to memory of 2628 3560 Explorer.EXE 92 PID 3560 wrote to memory of 2628 3560 Explorer.EXE 92 PID 3560 wrote to memory of 2628 3560 Explorer.EXE 92 PID 2628 wrote to memory of 2400 2628 rundll32.exe 94 PID 2628 wrote to memory of 2400 2628 rundll32.exe 94 PID 2628 wrote to memory of 2400 2628 rundll32.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3124 -
C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1288
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2400
-
-