Analysis
-
max time kernel
149s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Enquiry.exe
Resource
win7-20240903-en
General
-
Target
Enquiry.exe
-
Size
813KB
-
MD5
bb97d34fddf332ca03f69c16dc1b3ddf
-
SHA1
1c5c320dea0b4113c29e159fc69f71e483134cdb
-
SHA256
f2d382ad3eba8f9911837369359508a3cca7d3757de74b1284e4d530937b6f28
-
SHA512
b7733170085db549336c9d579921f2751319e7176767d0b1529c983cdb0eea8e0a6a902807f3ff9f3fdffc465d28f451fa0402e0da248c12d7fc642ad5341d2c
-
SSDEEP
12288:dBOXamCTLMQrkTuLLvGLN/vzgtK72rDmVLzkmZ22YZLoPZ4SI9VCZ6vO+2:dBO6TLM22UKGsWmVLz/2jLoxyB2
Malware Config
Extracted
xloader
2.3
3edq
qf212.com
cleanmoscow.com
shopkaitek.com
gehaflouine.com
saintlouisconsulting.com
kmeltonbeauty.com
kylaapp.com
ildstudyclub.com
fiat-mcmotors.today
daugoithaoduocphubac.com
associatesgmailonline.com
lsbtjx.com
almasgreat.com
francedeliverydhl.xyz
racevx.xyz
izaeristesi.com
tubacexgroups.com
envioslamacha.com
webtpon.com
rlnursinghomecare.com
funkymonkeygolfgifts.com
stakings.network
ricardo-rossi.com
ahueetadia.net
jubeelearning.com
jasatukarpulsa.com
getcrackz.com
souqstar.net
ghettosenatecorporation.com
purekypreps.com
plizzpacks.com
deltadentistil.com
understandingwt1.com
atolyetemizlik.com
ninjabartypes.com
veroslist.com
delsolarart.com
d966f.net
youngaming.com
bradforrexchange.com
chiroru510.com
pcxil.com
bloodbanksolutions.com
wssexmachine.com
winnipegwebdesigners.com
freshnessinmotion.com
wpiig.info
vrijensociaalnederland.com
igecreative.com
kusa-karu.com
knowledge-space900.com
atomicmeta.com
lebigconcours.com
lilysulekh.com
usatvstreaming.com
sarahcryer.com
automaticaexpo.com
ocalarealhomes.com
sarkarpanservice.xyz
bakerob.com
tronmatch.com
globalseniorgolftour.com
allaroundshopblog.com
grwpgoyioa.club
wt336688.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2876-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2876-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1160-22-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1780 set thread context of 2876 1780 Enquiry.exe 31 PID 2876 set thread context of 1236 2876 RegSvcs.exe 21 PID 1160 set thread context of 1236 1160 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1780 Enquiry.exe 1780 Enquiry.exe 1780 Enquiry.exe 2876 RegSvcs.exe 2876 RegSvcs.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe 1160 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2876 RegSvcs.exe 2876 RegSvcs.exe 2876 RegSvcs.exe 1160 chkdsk.exe 1160 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1780 Enquiry.exe Token: SeDebugPrivilege 2876 RegSvcs.exe Token: SeDebugPrivilege 1160 chkdsk.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2768 1780 Enquiry.exe 29 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2788 1780 Enquiry.exe 30 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1780 wrote to memory of 2876 1780 Enquiry.exe 31 PID 1236 wrote to memory of 1160 1236 Explorer.EXE 32 PID 1236 wrote to memory of 1160 1236 Explorer.EXE 32 PID 1236 wrote to memory of 1160 1236 Explorer.EXE 32 PID 1236 wrote to memory of 1160 1236 Explorer.EXE 32 PID 1160 wrote to memory of 1896 1160 chkdsk.exe 33 PID 1160 wrote to memory of 1896 1160 chkdsk.exe 33 PID 1160 wrote to memory of 1896 1160 chkdsk.exe 33 PID 1160 wrote to memory of 1896 1160 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Enquiry.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2768
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:2788
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2876
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1896
-
-