Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
OUTSTANDING SOA PDF.exe
Resource
win7-20241010-en
General
-
Target
OUTSTANDING SOA PDF.exe
-
Size
701KB
-
MD5
52034976e1fbea4f25050737b949ebca
-
SHA1
59fa258b62f43df44fd131684f11fe090e905159
-
SHA256
54959487d80d695894f408175af28cef3993a495f67c9e5ad98d30a355110cfe
-
SHA512
978cdf9778892d77ce7ed5cf80ca5c454e02fc55f52d32e35a3c2f6bc96280c16f611ef7178cc11d17262180aa4830a018affe24bac3c10f9cbb93dbe78c04fb
-
SSDEEP
12288:zJCS4+09q5p4YHZoAN7/5ZTnvqWs2Cd8eYRcJ6/:1CS4+06ikZN/PvqWsN+5+c
Malware Config
Extracted
xloader
2.6
g3ws
lashandragrey.com
rickster.tech
mfengnews.com
ignatovi.com
munjashoong.com
oplexxburn.com
freaner.agency
finetaxmultiservice.com
sydneyelectroservices.com
puma-factoryoutlet.com
kakaomobility-recruit.com
tombitz.com
kekenapeps.com
claudchat.com
hondenpaleis.com
hyswkimjisoo.xyz
ralphlaurenoutlet.us
cargonodeseado.xyz
virtualassistantsteam.com
mamaduduprints.com
taicidashi.com
69-yuk.net
ptrosaliaindah.com
saraathy.com
life2011gymnastics.com
engovis.com
middle-school.xyz
shinesc.com
jubtao.com
ctslrx.com
memelandminting.com
eatenbydawn.com
thaicools.com
fo-abinitio.com
losmocanes.com
kingofdastreet.com
athleticswise.com
lidertoptan.com
crowdofthecatwalk.com
easyplayer.space
chiderannamani.com
asiakino.com
k44mlt.xyz
winchesterhomes.info
greattalent.site
cricbookies.net
treatsbyconquerer.com
biolcatiroomandrestaurant.com
growwithbeccas.com
goodlordy.net
woburnroof.com
skyrayacquisitions.com
ichesk.com
holsterswim.com
hikstoor.com
amk-newlaunch.com
srimsemergency.com
jurusqq1.info
magazinegroup.site
rustybasket.online
xzwfsh.com
xfzdj.club
gefybui8.xyz
emt909gov.info
ruibaosh.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/4764-14-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/4764-19-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/4764-23-0x0000000000400000-0x000000000042B000-memory.dmp xloader behavioral2/memory/3564-31-0x00000000008C0000-0x00000000008EB000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3452 set thread context of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 4764 set thread context of 3364 4764 OUTSTANDING SOA PDF.exe 56 PID 4764 set thread context of 3364 4764 OUTSTANDING SOA PDF.exe 56 PID 3564 set thread context of 3364 3564 mstsc.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTSTANDING SOA PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language OUTSTANDING SOA PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 42 IoCs
pid Process 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe 3564 mstsc.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 4764 OUTSTANDING SOA PDF.exe 3564 mstsc.exe 3564 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4764 OUTSTANDING SOA PDF.exe Token: SeDebugPrivilege 3564 mstsc.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3452 wrote to memory of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 3452 wrote to memory of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 3452 wrote to memory of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 3452 wrote to memory of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 3452 wrote to memory of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 3452 wrote to memory of 4764 3452 OUTSTANDING SOA PDF.exe 100 PID 4764 wrote to memory of 3564 4764 OUTSTANDING SOA PDF.exe 102 PID 4764 wrote to memory of 3564 4764 OUTSTANDING SOA PDF.exe 102 PID 4764 wrote to memory of 3564 4764 OUTSTANDING SOA PDF.exe 102 PID 3564 wrote to memory of 3860 3564 mstsc.exe 103 PID 3564 wrote to memory of 3860 3564 mstsc.exe 103 PID 3564 wrote to memory of 3860 3564 mstsc.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3364
-
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3452 -
C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4764 -
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3564 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\OUTSTANDING SOA PDF.exe"5⤵
- System Location Discovery: System Language Discovery
PID:3860
-
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:3232
-