Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:31
Static task
static1
Behavioral task
behavioral1
Sample
Orden de compra.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Orden de compra.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
Orden de compra.exe
-
Size
240KB
-
MD5
79c4bfe2768aa6941fe3dddc7bd48e7d
-
SHA1
0f3d391d88a3b174ba33c3c1ef033f6089dbff16
-
SHA256
255506cf2f11fd60925729fe567e971eec5718dfff04051deac436d6e83874af
-
SHA512
c3e11a706269c476740645272ffac9229affe3e8263279ce9203735aa88916391c09408130e8d63acc7166570f8fe182fca387274151a34fbc315004a9ca4343
-
SSDEEP
6144:pBlL/4DgN8cOwmHQihvPJU9cubngctc57kyCwwX:P4gLeL69Vt7wA
Malware Config
Extracted
xloader
2.3
s4h4
v65mwh.com
ofertasempresariais.com
apoteklowamedika.com
shopblvdhair.com
jtcameraftp.com
vimlark.com
wamodo.com
mistersvisuals.com
copterapps.com
jamesebraxton.com
darmarcasepatentes.com
texasroofrepairpros.com
okaycollective.net
rughouzz.com
dgzhileng.com
markstipsandtoes.com
globalgrowlights.com
thehustleandco.com
fdgrenewables.com
sweetsells.com
rumunia.email
money-best.com
screentestcanada.com
bonap56.com
zxlongfa.com
makembed.com
antoniasafrica.com
rokteq.com
adimascollection.com
shopskinfactory.com
8kmjfd.com
weinsurerealty.com
mybvvspace.com
beachhousemotelnj.com
icloudtrace.com
littlefarmdreams.com
imageoftheunseen.com
veganoptimism.com
insureunitlink.com
englishonline.onl
idbma.net
dietov-shop.online
nmunitedtiles.com
kultivatemusicmanagement.net
unemploymantpua.com
thepcsolver.com
dailybreadandlivingwater.com
syboyi.com
catsanddogs.agency
thantai123.com
galatasourcing.com
cibeles.one
goldenkitchenfelling.com
angelsangelicamarmalade.com
tusam.digital
sm-dies.com
retrainaustralia.com
davidchurcherphotography.com
texasdivorcepro.com
rongshengsh.com
immobilienmentoring.com
fallguysmibile.com
xn--anahtarcm-2pb.com
hecmasolutions.com
hopelessvisonary.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2368-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2368-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Loads dropped DLL 2 IoCs
pid Process 2332 Orden de compra.exe 2332 Orden de compra.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2332 set thread context of 2368 2332 Orden de compra.exe 31 PID 2368 set thread context of 1124 2368 Orden de compra.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2736 2072 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Orden de compra.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2368 Orden de compra.exe 2368 Orden de compra.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2332 Orden de compra.exe 2368 Orden de compra.exe 2368 Orden de compra.exe 2368 Orden de compra.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2368 Orden de compra.exe Token: SeShutdownPrivilege 1124 Explorer.EXE Token: SeShutdownPrivilege 1124 Explorer.EXE Token: SeShutdownPrivilege 1124 Explorer.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2332 wrote to memory of 2368 2332 Orden de compra.exe 31 PID 2332 wrote to memory of 2368 2332 Orden de compra.exe 31 PID 2332 wrote to memory of 2368 2332 Orden de compra.exe 31 PID 2332 wrote to memory of 2368 2332 Orden de compra.exe 31 PID 2332 wrote to memory of 2368 2332 Orden de compra.exe 31 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 1124 wrote to memory of 2072 1124 Explorer.EXE 32 PID 2072 wrote to memory of 2736 2072 msiexec.exe 33 PID 2072 wrote to memory of 2736 2072 msiexec.exe 33 PID 2072 wrote to memory of 2736 2072 msiexec.exe 33 PID 2072 wrote to memory of 2736 2072 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Orden de compra.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Orden de compra.exe"C:\Users\Admin\AppData\Local\Temp\Orden de compra.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2368
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2072 -s 2683⤵
- Program crash
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3