Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING SOA PDF.exe
Resource
win7-20241010-en
General
-
Target
OUTSTANDING SOA PDF.exe
-
Size
701KB
-
MD5
52034976e1fbea4f25050737b949ebca
-
SHA1
59fa258b62f43df44fd131684f11fe090e905159
-
SHA256
54959487d80d695894f408175af28cef3993a495f67c9e5ad98d30a355110cfe
-
SHA512
978cdf9778892d77ce7ed5cf80ca5c454e02fc55f52d32e35a3c2f6bc96280c16f611ef7178cc11d17262180aa4830a018affe24bac3c10f9cbb93dbe78c04fb
-
SSDEEP
12288:zJCS4+09q5p4YHZoAN7/5ZTnvqWs2Cd8eYRcJ6/:1CS4+06ikZN/PvqWsN+5+c
Malware Config
Extracted
xloader
2.6
g3ws
lashandragrey.com
rickster.tech
mfengnews.com
ignatovi.com
munjashoong.com
oplexxburn.com
freaner.agency
finetaxmultiservice.com
sydneyelectroservices.com
puma-factoryoutlet.com
kakaomobility-recruit.com
tombitz.com
kekenapeps.com
claudchat.com
hondenpaleis.com
hyswkimjisoo.xyz
ralphlaurenoutlet.us
cargonodeseado.xyz
virtualassistantsteam.com
mamaduduprints.com
taicidashi.com
69-yuk.net
ptrosaliaindah.com
saraathy.com
life2011gymnastics.com
engovis.com
middle-school.xyz
shinesc.com
jubtao.com
ctslrx.com
memelandminting.com
eatenbydawn.com
thaicools.com
fo-abinitio.com
losmocanes.com
kingofdastreet.com
athleticswise.com
lidertoptan.com
crowdofthecatwalk.com
easyplayer.space
chiderannamani.com
asiakino.com
k44mlt.xyz
winchesterhomes.info
greattalent.site
cricbookies.net
treatsbyconquerer.com
biolcatiroomandrestaurant.com
growwithbeccas.com
goodlordy.net
woburnroof.com
skyrayacquisitions.com
ichesk.com
holsterswim.com
hikstoor.com
amk-newlaunch.com
srimsemergency.com
jurusqq1.info
magazinegroup.site
rustybasket.online
xzwfsh.com
xfzdj.club
gefybui8.xyz
emt909gov.info
ruibaosh.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2436-13-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/2436-17-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral1/memory/2436-21-0x0000000000400000-0x000000000042B000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2024 set thread context of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2436 set thread context of 1368 2436 OUTSTANDING SOA PDF.exe 21 PID 2436 set thread context of 1368 2436 OUTSTANDING SOA PDF.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2656 2592 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTSTANDING SOA PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2436 OUTSTANDING SOA PDF.exe 2436 OUTSTANDING SOA PDF.exe 2436 OUTSTANDING SOA PDF.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 2436 OUTSTANDING SOA PDF.exe 2436 OUTSTANDING SOA PDF.exe 2436 OUTSTANDING SOA PDF.exe 2436 OUTSTANDING SOA PDF.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2436 OUTSTANDING SOA PDF.exe Token: SeShutdownPrivilege 1368 Explorer.EXE Token: SeShutdownPrivilege 1368 Explorer.EXE Token: SeShutdownPrivilege 1368 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 2024 wrote to memory of 2436 2024 OUTSTANDING SOA PDF.exe 31 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 1368 wrote to memory of 2592 1368 Explorer.EXE 32 PID 2592 wrote to memory of 2656 2592 msiexec.exe 33 PID 2592 wrote to memory of 2656 2592 msiexec.exe 33 PID 2592 wrote to memory of 2656 2592 msiexec.exe 33 PID 2592 wrote to memory of 2656 2592 msiexec.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2436
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 2723⤵
- Program crash
PID:2656
-
-