Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:34
Static task
static1
Behavioral task
behavioral1
Sample
DC Viet Nam Order list 6-25-21.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
DC Viet Nam Order list 6-25-21.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
General
-
Target
DC Viet Nam Order list 6-25-21.exe
-
Size
264KB
-
MD5
e1df9b8f6170bc4241edffd642949901
-
SHA1
261767a7e271d39393619109d1310f04dfba5b41
-
SHA256
8b225e713429dd95fed7fe2af260d9076d627279fc86d152baedd973f0b72304
-
SHA512
ce8101ebf096555be8e6cd02d261ae9a244978e91247291528d4cc49689cf5f1760f54672cfb5dd5648ac0a6c8956011faa4faf2bc63a06bc402cfdc9c74f23a
-
SSDEEP
6144:rTqjFeDgN8f9QQbj67yFKvyiUmSw87aplOTCMCNY8r0lkssE3plf:fZg4qQb8FzUmS7ClOTCnJglWE3
Malware Config
Extracted
xloader
2.3
s4h4
v65mwh.com
ofertasempresariais.com
apoteklowamedika.com
shopblvdhair.com
jtcameraftp.com
vimlark.com
wamodo.com
mistersvisuals.com
copterapps.com
jamesebraxton.com
darmarcasepatentes.com
texasroofrepairpros.com
okaycollective.net
rughouzz.com
dgzhileng.com
markstipsandtoes.com
globalgrowlights.com
thehustleandco.com
fdgrenewables.com
sweetsells.com
rumunia.email
money-best.com
screentestcanada.com
bonap56.com
zxlongfa.com
makembed.com
antoniasafrica.com
rokteq.com
adimascollection.com
shopskinfactory.com
8kmjfd.com
weinsurerealty.com
mybvvspace.com
beachhousemotelnj.com
icloudtrace.com
littlefarmdreams.com
imageoftheunseen.com
veganoptimism.com
insureunitlink.com
englishonline.onl
idbma.net
dietov-shop.online
nmunitedtiles.com
kultivatemusicmanagement.net
unemploymantpua.com
thepcsolver.com
dailybreadandlivingwater.com
syboyi.com
catsanddogs.agency
thantai123.com
galatasourcing.com
cibeles.one
goldenkitchenfelling.com
angelsangelicamarmalade.com
tusam.digital
sm-dies.com
retrainaustralia.com
davidchurcherphotography.com
texasdivorcepro.com
rongshengsh.com
immobilienmentoring.com
fallguysmibile.com
xn--anahtarcm-2pb.com
hecmasolutions.com
hopelessvisonary.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2804-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2804-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2804-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2752-24-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1636 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 2296 DC Viet Nam Order list 6-25-21.exe 2296 DC Viet Nam Order list 6-25-21.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2296 set thread context of 2804 2296 DC Viet Nam Order list 6-25-21.exe 31 PID 2804 set thread context of 1256 2804 DC Viet Nam Order list 6-25-21.exe 21 PID 2804 set thread context of 1256 2804 DC Viet Nam Order list 6-25-21.exe 21 PID 2752 set thread context of 1256 2752 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DC Viet Nam Order list 6-25-21.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2804 DC Viet Nam Order list 6-25-21.exe 2804 DC Viet Nam Order list 6-25-21.exe 2804 DC Viet Nam Order list 6-25-21.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe 2752 cmstp.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2296 DC Viet Nam Order list 6-25-21.exe 2804 DC Viet Nam Order list 6-25-21.exe 2804 DC Viet Nam Order list 6-25-21.exe 2804 DC Viet Nam Order list 6-25-21.exe 2804 DC Viet Nam Order list 6-25-21.exe 2752 cmstp.exe 2752 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2804 DC Viet Nam Order list 6-25-21.exe Token: SeDebugPrivilege 2752 cmstp.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2804 2296 DC Viet Nam Order list 6-25-21.exe 31 PID 2296 wrote to memory of 2804 2296 DC Viet Nam Order list 6-25-21.exe 31 PID 2296 wrote to memory of 2804 2296 DC Viet Nam Order list 6-25-21.exe 31 PID 2296 wrote to memory of 2804 2296 DC Viet Nam Order list 6-25-21.exe 31 PID 2296 wrote to memory of 2804 2296 DC Viet Nam Order list 6-25-21.exe 31 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 1256 wrote to memory of 2752 1256 Explorer.EXE 52 PID 2752 wrote to memory of 1636 2752 cmstp.exe 53 PID 2752 wrote to memory of 1636 2752 cmstp.exe 53 PID 2752 wrote to memory of 1636 2752 cmstp.exe 53 PID 2752 wrote to memory of 1636 2752 cmstp.exe 53
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2804
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2784
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2756
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2768
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2600
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2764
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2716
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2744
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2632
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2692
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2776
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2580
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2588
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2596
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2636
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2656
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1300
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1696
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2108
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2628
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2068
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1636
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
10KB
MD556a321bd011112ec5d8a32b2f6fd3231
SHA1df20e3a35a1636de64df5290ae5e4e7572447f78
SHA256bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1
SHA5125354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3