Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
#700317000.pdf.exe
Resource
win7-20240903-en
General
-
Target
#700317000.pdf.exe
-
Size
493KB
-
MD5
00b8b08c4cb4e862180416e97d5fcde6
-
SHA1
2fad1a0c6d35b8d7aaf6cede9e5260339f070a0d
-
SHA256
5d229dbbaa8e7f2584502ab1f3fd82c25504a5bb72ff718d32184dce04bcded9
-
SHA512
9dc385fe54fa86be6aac85d44b6f30b283655360ea7a3c3bd0a9cd5ab1fdb7b9f23b69abbd7f65cf3a756b848ca55ef9b27dbd956cab8ef9f2b674d91577120f
-
SSDEEP
6144:MqQJ3h4FLvCp+hJ11j8tG88R3DI4A0rkQklyId9bvLNnnYuWkULf5dq8+hZFBaai:MT0LvCp+hJ1mGBRzHp4dBNYVkkdqtrF
Malware Config
Extracted
xloader
2.3
gm9w
steffiemor.com
qe2rvstorage.com
louisteak.com
top-dex2.com
fafeiya.com
saffure.com
1upshopandstuff.com
wemove66.com
deckswap.info
joinjifu.com
joboval.com
stilldeliciousvegan.com
intercunt.com
espaciosterapeutas.com
doglai.com
situationslayer.com
adbreaks.net
cdjy666.com
ap70mm.com
gwh525.xyz
ehealthvt.com
brihastie.com
mariathecleaningfairy.com
am8886.com
uaz-chile.com
andreavarela.life
bbbx4.com
sponge-butt.com
129772.com
gakadaselectricals.com
dreambigmalta.com
service-kanbsvtsrkfrtk.com
xn--mariachilen-zeb.com
spellboundgardens.com
hide-illusion.com
mainstreamtravels.com
indiankitchenstjohnswood.com
alritmodelaselva.com
keelzo.com
chipoltr.com
florentinatravel.com
mysteryinabox.net
689abc.com
musicmoral.icu
lukesmugs.com
reatraur.com
studio27cincinnati.com
thegoddessguides.com
luxe-byb.com
singaporeplan.com
asyaalisveris.com
mod-designsllc.com
mdjbjsc.com
radioaraguaia.com
adeliabeautystore.com
shopantourage.com
cotizadorcipsa.com
kingsalumi.com
techlearning.group
gibraltarcorp.com
queenhousespa.com
thecarburetor.com
bitlisorganikurunleri.com
intechcements.com
activepurelawsuit.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2748-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2748-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2872-24-0x00000000000C0000-0x00000000000E8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2328 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2156 set thread context of 2748 2156 #700317000.pdf.exe 31 PID 2748 set thread context of 1240 2748 #700317000.pdf.exe 21 PID 2872 set thread context of 1240 2872 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language #700317000.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2748 #700317000.pdf.exe 2748 #700317000.pdf.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe 2872 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2748 #700317000.pdf.exe 2748 #700317000.pdf.exe 2748 #700317000.pdf.exe 2872 msdt.exe 2872 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2748 #700317000.pdf.exe Token: SeDebugPrivilege 2872 msdt.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 2156 wrote to memory of 2748 2156 #700317000.pdf.exe 31 PID 1240 wrote to memory of 2872 1240 Explorer.EXE 55 PID 1240 wrote to memory of 2872 1240 Explorer.EXE 55 PID 1240 wrote to memory of 2872 1240 Explorer.EXE 55 PID 1240 wrote to memory of 2872 1240 Explorer.EXE 55 PID 2872 wrote to memory of 2328 2872 msdt.exe 56 PID 2872 wrote to memory of 2328 2872 msdt.exe 56 PID 2872 wrote to memory of 2328 2872 msdt.exe 56 PID 2872 wrote to memory of 2328 2872 msdt.exe 56
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2748
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2636
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2632
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1328
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2744
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2780
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2772
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2720
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1140
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2608
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2604
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2628
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2652
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2672
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2684
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2136
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2340
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:548
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2336
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2252
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1796
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2384
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1872
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1852
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2328
-
-