Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:33
Static task
static1
Behavioral task
behavioral1
Sample
Enquiry.exe
Resource
win7-20240903-en
General
-
Target
Enquiry.exe
-
Size
813KB
-
MD5
bb97d34fddf332ca03f69c16dc1b3ddf
-
SHA1
1c5c320dea0b4113c29e159fc69f71e483134cdb
-
SHA256
f2d382ad3eba8f9911837369359508a3cca7d3757de74b1284e4d530937b6f28
-
SHA512
b7733170085db549336c9d579921f2751319e7176767d0b1529c983cdb0eea8e0a6a902807f3ff9f3fdffc465d28f451fa0402e0da248c12d7fc642ad5341d2c
-
SSDEEP
12288:dBOXamCTLMQrkTuLLvGLN/vzgtK72rDmVLzkmZ22YZLoPZ4SI9VCZ6vO+2:dBO6TLM22UKGsWmVLz/2jLoxyB2
Malware Config
Extracted
xloader
2.3
3edq
qf212.com
cleanmoscow.com
shopkaitek.com
gehaflouine.com
saintlouisconsulting.com
kmeltonbeauty.com
kylaapp.com
ildstudyclub.com
fiat-mcmotors.today
daugoithaoduocphubac.com
associatesgmailonline.com
lsbtjx.com
almasgreat.com
francedeliverydhl.xyz
racevx.xyz
izaeristesi.com
tubacexgroups.com
envioslamacha.com
webtpon.com
rlnursinghomecare.com
funkymonkeygolfgifts.com
stakings.network
ricardo-rossi.com
ahueetadia.net
jubeelearning.com
jasatukarpulsa.com
getcrackz.com
souqstar.net
ghettosenatecorporation.com
purekypreps.com
plizzpacks.com
deltadentistil.com
understandingwt1.com
atolyetemizlik.com
ninjabartypes.com
veroslist.com
delsolarart.com
d966f.net
youngaming.com
bradforrexchange.com
chiroru510.com
pcxil.com
bloodbanksolutions.com
wssexmachine.com
winnipegwebdesigners.com
freshnessinmotion.com
wpiig.info
vrijensociaalnederland.com
igecreative.com
kusa-karu.com
knowledge-space900.com
atomicmeta.com
lebigconcours.com
lilysulekh.com
usatvstreaming.com
sarahcryer.com
automaticaexpo.com
ocalarealhomes.com
sarkarpanservice.xyz
bakerob.com
tronmatch.com
globalseniorgolftour.com
allaroundshopblog.com
grwpgoyioa.club
wt336688.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2492-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2492-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3200-26-0x0000000000620000-0x0000000000648000-memory.dmp xloader behavioral2/memory/3200-28-0x0000000000620000-0x0000000000648000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3112 set thread context of 2492 3112 Enquiry.exe 100 PID 2492 set thread context of 3520 2492 RegSvcs.exe 56 PID 3200 set thread context of 3520 3200 msiexec.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Enquiry.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msiexec.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3112 Enquiry.exe 3112 Enquiry.exe 3112 Enquiry.exe 2492 RegSvcs.exe 2492 RegSvcs.exe 2492 RegSvcs.exe 2492 RegSvcs.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe 3200 msiexec.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2492 RegSvcs.exe 2492 RegSvcs.exe 2492 RegSvcs.exe 3200 msiexec.exe 3200 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3112 Enquiry.exe Token: SeDebugPrivilege 2492 RegSvcs.exe Token: SeDebugPrivilege 3200 msiexec.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3112 wrote to memory of 1584 3112 Enquiry.exe 99 PID 3112 wrote to memory of 1584 3112 Enquiry.exe 99 PID 3112 wrote to memory of 1584 3112 Enquiry.exe 99 PID 3112 wrote to memory of 2492 3112 Enquiry.exe 100 PID 3112 wrote to memory of 2492 3112 Enquiry.exe 100 PID 3112 wrote to memory of 2492 3112 Enquiry.exe 100 PID 3112 wrote to memory of 2492 3112 Enquiry.exe 100 PID 3112 wrote to memory of 2492 3112 Enquiry.exe 100 PID 3112 wrote to memory of 2492 3112 Enquiry.exe 100 PID 3520 wrote to memory of 3200 3520 Explorer.EXE 101 PID 3520 wrote to memory of 3200 3520 Explorer.EXE 101 PID 3520 wrote to memory of 3200 3520 Explorer.EXE 101 PID 3200 wrote to memory of 3528 3200 msiexec.exe 102 PID 3200 wrote to memory of 3528 3200 msiexec.exe 102 PID 3200 wrote to memory of 3528 3200 msiexec.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3520 -
C:\Users\Admin\AppData\Local\Temp\Enquiry.exe"C:\Users\Admin\AppData\Local\Temp\Enquiry.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵PID:1584
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2492
-
-
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3200 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3528
-
-