Analysis
-
max time kernel
147s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
Inv.80967568.Scan.pdf.....exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
Inv.80967568.Scan.pdf.....exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/blgyqihyvgd.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/blgyqihyvgd.dll
Resource
win10v2004-20241007-en
General
-
Target
Inv.80967568.Scan.pdf.....exe
-
Size
321KB
-
MD5
0fdcc8266884dd687604486514c6634c
-
SHA1
afdabfb1c31580bbda9a1722e6e0839bd32df3f9
-
SHA256
e4447b89d65251cb238f02c538cf01488628c61ac709f195535feec8e18ec9e3
-
SHA512
1e08f28e87c26a13645b23f4d0ca209feeaa252357bf9a294556771c24bd261e627bde1603d0947d7aed2de0b366c27eb520527b978e0fd2cafc0ea9016ac023
-
SSDEEP
6144:18LxBz9FLFYq1kvN/o7QFPRVbaVmVP7BlpFFxNwzR:49FLFd1ktoMFPcmFLpjiR
Malware Config
Extracted
xloader
2.4
di4c
oscd.store
simplyminiatures.com
famouslovebackbaba.com
turkesteronesupplement.com
most-attractive.com
le-thermoplongeur.com
joydeb.xyz
incomepanther.com
infoterkiinii.xyz
indigocard.website
plasthecnolgy.com
canmamap.com
aviationtrainingworldusa.com
successoffplan.com
desert-breeze.com
nilavarna.com
stanthonyswelfare.com
shezefy.com
shcq08.xyz
spencerpauley.com
breakfastatbrittanys.com
workspace-mex.com
litteratorum.com
illstitute.com
framed-speed.com
buyandsellwithalec.com
xwdnawbx.xyz
mickyyoung.com
bandiu.xyz
planft.store
imaginalworks.com
lid-gb.xyz
ahgongs.com
carrirbuilder.com
neuro-ai-web-online.club
booparade.com
sketchfujitah.online
bayboatnation.com
ink2words.com
modernsolarusa.com
camuci.com
dentonlifetimedentistry.com
1ajpwvkk.icu
hangcheng56.com
suvenifa.com
spacetech-sa.com
emotionevents.xyz
momskitchenassam.com
imyandme.com
premiercattledrenches.com
procard.one
quiestcevin.com
blastofftv.xyz
live2leadinfo.com
jaalifetrx.space
weste-store.store
liquidmelon.restaurant
gjz863.icu
prince-info.com
islandsingle.com
shelazofficial.com
awhjguduahjfsd.com
notariuspublicus24.com
navneetsharma.xyz
dropadsmedia.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2868-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2868-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2072-20-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2876 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 Inv.80967568.Scan.pdf.....exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2216 set thread context of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2868 set thread context of 1192 2868 Inv.80967568.Scan.pdf.....exe 20 PID 2072 set thread context of 1192 2072 mstsc.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Inv.80967568.Scan.pdf.....exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2868 Inv.80967568.Scan.pdf.....exe 2868 Inv.80967568.Scan.pdf.....exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe 2072 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2868 Inv.80967568.Scan.pdf.....exe 2868 Inv.80967568.Scan.pdf.....exe 2868 Inv.80967568.Scan.pdf.....exe 2072 mstsc.exe 2072 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2868 Inv.80967568.Scan.pdf.....exe Token: SeDebugPrivilege 2072 mstsc.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 2216 wrote to memory of 2868 2216 Inv.80967568.Scan.pdf.....exe 29 PID 1192 wrote to memory of 2072 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2072 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2072 1192 Explorer.EXE 30 PID 1192 wrote to memory of 2072 1192 Explorer.EXE 30 PID 2072 wrote to memory of 2876 2072 mstsc.exe 31 PID 2072 wrote to memory of 2876 2072 mstsc.exe 31 PID 2072 wrote to memory of 2876 2072 mstsc.exe 31 PID 2072 wrote to memory of 2876 2072 mstsc.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2868
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Inv.80967568.Scan.pdf.....exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
17KB
MD5aff7a15a068a40996bbec6d2f8fe510a
SHA1c05a992dc17306bb507bfa0b5e4d68edd8809c99
SHA25686ec7cf90bd0ca677b897807c5391958e539890822e607a5087035308e527f64
SHA512cda72fff7af615df8a5f407ddde60c013ccb0816a30a32673eefa8973101f87039b95e466078b764298c3890cdbfe6b02dc65a7b7bff3ab81514507bccf139bd