Analysis
-
max time kernel
149s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
#700317000.pdf.exe
Resource
win7-20240903-en
General
-
Target
#700317000.pdf.exe
-
Size
493KB
-
MD5
00b8b08c4cb4e862180416e97d5fcde6
-
SHA1
2fad1a0c6d35b8d7aaf6cede9e5260339f070a0d
-
SHA256
5d229dbbaa8e7f2584502ab1f3fd82c25504a5bb72ff718d32184dce04bcded9
-
SHA512
9dc385fe54fa86be6aac85d44b6f30b283655360ea7a3c3bd0a9cd5ab1fdb7b9f23b69abbd7f65cf3a756b848ca55ef9b27dbd956cab8ef9f2b674d91577120f
-
SSDEEP
6144:MqQJ3h4FLvCp+hJ11j8tG88R3DI4A0rkQklyId9bvLNnnYuWkULf5dq8+hZFBaai:MT0LvCp+hJ1mGBRzHp4dBNYVkkdqtrF
Malware Config
Extracted
xloader
2.3
gm9w
steffiemor.com
qe2rvstorage.com
louisteak.com
top-dex2.com
fafeiya.com
saffure.com
1upshopandstuff.com
wemove66.com
deckswap.info
joinjifu.com
joboval.com
stilldeliciousvegan.com
intercunt.com
espaciosterapeutas.com
doglai.com
situationslayer.com
adbreaks.net
cdjy666.com
ap70mm.com
gwh525.xyz
ehealthvt.com
brihastie.com
mariathecleaningfairy.com
am8886.com
uaz-chile.com
andreavarela.life
bbbx4.com
sponge-butt.com
129772.com
gakadaselectricals.com
dreambigmalta.com
service-kanbsvtsrkfrtk.com
xn--mariachilen-zeb.com
spellboundgardens.com
hide-illusion.com
mainstreamtravels.com
indiankitchenstjohnswood.com
alritmodelaselva.com
keelzo.com
chipoltr.com
florentinatravel.com
mysteryinabox.net
689abc.com
musicmoral.icu
lukesmugs.com
reatraur.com
studio27cincinnati.com
thegoddessguides.com
luxe-byb.com
singaporeplan.com
asyaalisveris.com
mod-designsllc.com
mdjbjsc.com
radioaraguaia.com
adeliabeautystore.com
shopantourage.com
cotizadorcipsa.com
kingsalumi.com
techlearning.group
gibraltarcorp.com
queenhousespa.com
thecarburetor.com
bitlisorganikurunleri.com
intechcements.com
activepurelawsuit.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2780-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2780-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4432-22-0x00000000007B0000-0x00000000007D8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4944 set thread context of 2780 4944 #700317000.pdf.exe 98 PID 2780 set thread context of 3472 2780 #700317000.pdf.exe 56 PID 4432 set thread context of 3472 4432 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language #700317000.pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 2780 #700317000.pdf.exe 2780 #700317000.pdf.exe 2780 #700317000.pdf.exe 2780 #700317000.pdf.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe 4432 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2780 #700317000.pdf.exe 2780 #700317000.pdf.exe 2780 #700317000.pdf.exe 4432 wscript.exe 4432 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2780 #700317000.pdf.exe Token: SeDebugPrivilege 4432 wscript.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4944 wrote to memory of 2780 4944 #700317000.pdf.exe 98 PID 4944 wrote to memory of 2780 4944 #700317000.pdf.exe 98 PID 4944 wrote to memory of 2780 4944 #700317000.pdf.exe 98 PID 4944 wrote to memory of 2780 4944 #700317000.pdf.exe 98 PID 4944 wrote to memory of 2780 4944 #700317000.pdf.exe 98 PID 4944 wrote to memory of 2780 4944 #700317000.pdf.exe 98 PID 3472 wrote to memory of 4432 3472 Explorer.EXE 99 PID 3472 wrote to memory of 4432 3472 Explorer.EXE 99 PID 3472 wrote to memory of 4432 3472 Explorer.EXE 99 PID 4432 wrote to memory of 4980 4432 wscript.exe 100 PID 4432 wrote to memory of 4980 4432 wscript.exe 100 PID 4432 wrote to memory of 4980 4432 wscript.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2780
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\#700317000.pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:4980
-
-