Analysis
-
max time kernel
147s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Order 4566789.exe
Resource
win7-20241010-en
General
-
Target
Order 4566789.exe
-
Size
838KB
-
MD5
2d9ded5e11d7f45bf9f534b7257b1759
-
SHA1
98dc535995c9cf3eb2b448b313e738dd3cfe9da8
-
SHA256
44642b64aeb3a5366b70e88c307e938aefb25fea2e6f5a5520c8829f19552f9c
-
SHA512
4d25c22e478a6fae64f147a973a12911148ce408f429f3444df433ecd71fb516495bd717a65b07cc33eade85221d309b7d763d83f45c6fd70c1876d496953d45
-
SSDEEP
12288:lg8edcf0v6QWTSG1A8FVxlrNStv8Q7BHe40p6pmAupZCmH6hTcWDpMoaU7yo4LPi:lgv6QWTz1dPSt0QFH0KmAum
Malware Config
Extracted
xloader
2.5
inga
21sq.xyz
aleimanpaper.com
soulworkerrush.com
lianxiwan.xyz
gorastionse.store
nuhuo333.xyz
greenft.xyz
upisout.com
mgav23.xyz
2day-recv.info
emdestak.com
generatorgmer.xyz
inmyhindi.com
meenubhosale.com
feinquebrantabledoc.com
valgtrizoma.quest
impqtantaou.com
nomorewarnow.com
gmcrjizppcx.mobi
eludice.net
allmoves.net
directionsettingpoint.xyz
gasandliquidcontrols.com
creativeportraitstudios.com
algurg-living.com
plotniska.net
njjbds.com
afromoorishfilms.com
fifihill.com
lamphuchai.xyz
j3ebx4thyf5h.biz
medicinalweed.lat
ankaraogrenciescort.xyz
vendasaprovadaonline.com
joinlegacyforge.com
onthemarket-smartboard.com
anatox-lab.fr
chouwakarunewssokuhou.com
lovawood.com
bethesdaclinicllc.com
sourcemycandles.com
losangelescapainters.com
powersforsupervillains.com
cumbrebomberos.com
mintnft.fund
sxuseon.com
scmce.com
nidoumenojinsei.online
qywyfeo8.xyz
ptmetaverse.com
geoplates.com
csfromsinai.com
xiraji21.com
r-souls.com
findinvest.xyz
stealthcarrier.com
d72gmj3bpdhc.biz
keepitng.com
hobe.agency
coach2college.com
thephilangies.com
adforalums.com
webwideoffers.com
seattlerealestateauction.com
seacoasttractor.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2900-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2900-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2900-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2616-28-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2176 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2868 set thread context of 2900 2868 Order 4566789.exe 33 PID 2900 set thread context of 1352 2900 Order 4566789.exe 21 PID 2900 set thread context of 1352 2900 Order 4566789.exe 21 PID 2616 set thread context of 1352 2616 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order 4566789.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2868 Order 4566789.exe 2868 Order 4566789.exe 2868 Order 4566789.exe 2868 Order 4566789.exe 2868 Order 4566789.exe 2868 Order 4566789.exe 2900 Order 4566789.exe 2900 Order 4566789.exe 2900 Order 4566789.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe 2616 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2900 Order 4566789.exe 2900 Order 4566789.exe 2900 Order 4566789.exe 2900 Order 4566789.exe 2616 explorer.exe 2616 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2868 Order 4566789.exe Token: SeDebugPrivilege 2900 Order 4566789.exe Token: SeDebugPrivilege 2616 explorer.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 2868 wrote to memory of 2572 2868 Order 4566789.exe 30 PID 2868 wrote to memory of 2572 2868 Order 4566789.exe 30 PID 2868 wrote to memory of 2572 2868 Order 4566789.exe 30 PID 2868 wrote to memory of 2572 2868 Order 4566789.exe 30 PID 2868 wrote to memory of 2800 2868 Order 4566789.exe 31 PID 2868 wrote to memory of 2800 2868 Order 4566789.exe 31 PID 2868 wrote to memory of 2800 2868 Order 4566789.exe 31 PID 2868 wrote to memory of 2800 2868 Order 4566789.exe 31 PID 2868 wrote to memory of 2684 2868 Order 4566789.exe 32 PID 2868 wrote to memory of 2684 2868 Order 4566789.exe 32 PID 2868 wrote to memory of 2684 2868 Order 4566789.exe 32 PID 2868 wrote to memory of 2684 2868 Order 4566789.exe 32 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 2868 wrote to memory of 2900 2868 Order 4566789.exe 33 PID 1352 wrote to memory of 2616 1352 Explorer.EXE 34 PID 1352 wrote to memory of 2616 1352 Explorer.EXE 34 PID 1352 wrote to memory of 2616 1352 Explorer.EXE 34 PID 1352 wrote to memory of 2616 1352 Explorer.EXE 34 PID 2616 wrote to memory of 2176 2616 explorer.exe 35 PID 2616 wrote to memory of 2176 2616 explorer.exe 35 PID 2616 wrote to memory of 2176 2616 explorer.exe 35 PID 2616 wrote to memory of 2176 2616 explorer.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"{path}"3⤵PID:2572
-
-
C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"{path}"3⤵PID:2800
-
-
C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"{path}"3⤵PID:2684
-
-
C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2900
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order 4566789.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2176
-
-