Analysis
-
max time kernel
148s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:13
Static task
static1
Behavioral task
behavioral1
Sample
Pump Parts & Stainless Steel.exe
Resource
win7-20241023-en
General
-
Target
Pump Parts & Stainless Steel.exe
-
Size
540KB
-
MD5
e0213cf3bd4ca9cfd094272ed98c37a6
-
SHA1
704402640a854c50d4a787155d4eba19829106c9
-
SHA256
9e94ea964630e088c92a9caf37bbf4e9716e9490142e58f3ba84042b02461021
-
SHA512
e52494a23e98c19c23c18c025de804426464101d436b6ba66b096112bc8c06ff86baed2d3164688f15299edf2c4a5351b12475e70f7cde851d7b9006e8913e86
-
SSDEEP
12288:YhAgAIs25v5+Yzr9KtMsIUFVhwsAsK4POYiUmjclhVkOHdSMV/8pS:Y15lzr9F3UjKZsK49+4
Malware Config
Extracted
xloader
2.5
m3ci
424964.com
ocean-breath-retreat.com
icidedansdehors.art
wrochtthurl.quest
6455gfg.top
dgfipmailservice.online
banjofarmenica.com
dkcazin.com
jobs-fp.com
karens-kornerr.com
parmaesq.com
nuevochile.net
inputsquad.com
consultacedula-sep.digital
taogoubao.net
gimmesolar.com
bluelacedefense.com
grandagent.club
warqatalzawaj.com
getvirbelanow.com
omnifichub.com
rjtherealest.com
hqpzchmo.xyz
pearl-street-art.com
dudukrumah.com
resetmybutton.info
dinodao.xyz
payment-securecard.com
gorjessbyjessicaservice.website
edayispeove.com
glorian34.com
moviezwaphd.red
bxqiche.com
associate-cien.com
coparivan.quest
buyseneca.com
del-directory.xyz
thedarkhuntressexperience.com
trevaleaf.com
kwsi.online
2552111.com
highpacts.com
queenslandspirits.com
magazinhaberlerim.com
radialodge.com
packgames.store
sterre.one
tkspoboys.com
datashen.com
xn--4gqyn781iuoq.xyz
breadnbutterflies.com
intotheground.net
tenlog043.xyz
bendingwillowbirth.com
lavellwesley.com
aumpatho.com
fdklflkdioerklfdke.store
nxscrapbook.com
dan-is-a-ghey-retard.com
retailzoohub.com
pause-beautystore.com
accentpavementmaintenance.com
brittsballers.com
indev-mobility.info
bravobug.net
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2808-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2808-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2808-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2860-27-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2604 set thread context of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2808 set thread context of 1208 2808 RegSvcs.exe 21 PID 2808 set thread context of 1208 2808 RegSvcs.exe 21 PID 2860 set thread context of 1208 2860 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Pump Parts & Stainless Steel.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 28 IoCs
pid Process 2604 Pump Parts & Stainless Steel.exe 2604 Pump Parts & Stainless Steel.exe 2808 RegSvcs.exe 2808 RegSvcs.exe 2808 RegSvcs.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe 2860 control.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2808 RegSvcs.exe 2808 RegSvcs.exe 2808 RegSvcs.exe 2808 RegSvcs.exe 2860 control.exe 2860 control.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2604 Pump Parts & Stainless Steel.exe Token: SeDebugPrivilege 2808 RegSvcs.exe Token: SeDebugPrivilege 2860 control.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2096 2604 Pump Parts & Stainless Steel.exe 31 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 2604 wrote to memory of 2808 2604 Pump Parts & Stainless Steel.exe 32 PID 1208 wrote to memory of 2860 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2860 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2860 1208 Explorer.EXE 33 PID 1208 wrote to memory of 2860 1208 Explorer.EXE 33 PID 2860 wrote to memory of 2852 2860 control.exe 34 PID 2860 wrote to memory of 2852 2860 control.exe 34 PID 2860 wrote to memory of 2852 2860 control.exe 34 PID 2860 wrote to memory of 2852 2860 control.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Pump Parts & Stainless Steel.exe"C:\Users\Admin\AppData\Local\Temp\Pump Parts & Stainless Steel.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵PID:2096
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2852
-
-