Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
PROFORMA_INVOICE_pdf.exe
Resource
win7-20240903-en
General
-
Target
PROFORMA_INVOICE_pdf.exe
-
Size
761KB
-
MD5
66dd27da37cdd67246a447220949d943
-
SHA1
9158ff8fa1c879152487665c0dc37e8d6c91b00d
-
SHA256
eb20acaf619f8bec9cf1e1353600b3825744b86b0a4281a299efefeb91b93c35
-
SHA512
98f2a3e56eeb4bcee9a1f055e1f8cbb12cc4e3333a04a3b7770b4b30bd74ea18f1220a71679188d3e925d945449f522664ba75cd6fe4c3771aa8715cd52981d8
-
SSDEEP
12288:wQ1n6Xu/kw+RL8RaE8qr/y9uBQBIBfFYTSanW6ivuB5oW:L6+4Ed/ycsI8uyIW
Malware Config
Extracted
xloader
2.3
me2z
rampdauto.com
noriharte.com
harborfreightcreditcard.com
tktspyhwz.icu
cagehosting.com
hgfte.club
fullnessspa.com
link-repair.com
rrjyds.com
edevletdestekcardmerkez.com
sprayingmachines.com
janerowenlester.com
velocityworkflow.com
kcrm.computer
kjbubeng.com
virtualhockeyconference.com
trugrits.com
creativesociallight.com
dnaswabtesting.com
willpool.com
linkcreditcards.com
beauspot.com
bibliotheca.one
probingislam.com
somachaudhuri.com
xn--alkansuartma-94b.com
taharakikaku.com
youkepub.net
310of167-173bundockstreet.com
thrivemoda.com
remotejobsinusa.com
seanwardphoto.com
cryoportsementanks.com
hualhome.com
balletvideoart.com
rydigital.com
uniquestreams.com
inviteonlysyndicate.com
globalmilitaryaircraft.com
makemymarketingwork.com
12388xpj.com
erometa.com
beckslivesheathy.com
veganpoochie.com
serenalynnsstudio.com
martingainza.com
bingent.info
futmilionarioficial.com
reformascreativas.com
aduhelmefficacy.com
ayushenterprises.net
lupilo.com
shinesupportservice.com
on-coverstore.com
alcove.network
isabellelinhnguyen.com
throwingshadeeyewear.com
insomniasos.net
sipdoxxx.xyz
freeyouriphone.com
fenghaijituan.com
lincolnreadymeals.com
jattfatehpur.com
postaposative.com
believe.academy
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2772-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2772-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2772-23-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2664-29-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2652 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2444 set thread context of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2772 set thread context of 1232 2772 PROFORMA_INVOICE_pdf.exe 21 PID 2772 set thread context of 1232 2772 PROFORMA_INVOICE_pdf.exe 21 PID 2664 set thread context of 1232 2664 cmd.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PROFORMA_INVOICE_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2908 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2772 PROFORMA_INVOICE_pdf.exe 2772 PROFORMA_INVOICE_pdf.exe 2444 PROFORMA_INVOICE_pdf.exe 2772 PROFORMA_INVOICE_pdf.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe 2664 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2772 PROFORMA_INVOICE_pdf.exe 2772 PROFORMA_INVOICE_pdf.exe 2772 PROFORMA_INVOICE_pdf.exe 2772 PROFORMA_INVOICE_pdf.exe 2664 cmd.exe 2664 cmd.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2444 PROFORMA_INVOICE_pdf.exe Token: SeDebugPrivilege 2772 PROFORMA_INVOICE_pdf.exe Token: SeDebugPrivilege 2664 cmd.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2444 wrote to memory of 2908 2444 PROFORMA_INVOICE_pdf.exe 31 PID 2444 wrote to memory of 2908 2444 PROFORMA_INVOICE_pdf.exe 31 PID 2444 wrote to memory of 2908 2444 PROFORMA_INVOICE_pdf.exe 31 PID 2444 wrote to memory of 2908 2444 PROFORMA_INVOICE_pdf.exe 31 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 2444 wrote to memory of 2772 2444 PROFORMA_INVOICE_pdf.exe 33 PID 1232 wrote to memory of 2664 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2664 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2664 1232 Explorer.EXE 34 PID 1232 wrote to memory of 2664 1232 Explorer.EXE 34 PID 2664 wrote to memory of 2652 2664 cmd.exe 35 PID 2664 wrote to memory of 2652 2664 cmd.exe 35 PID 2664 wrote to memory of 2652 2664 cmd.exe 35 PID 2664 wrote to memory of 2652 2664 cmd.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe"C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SgFiknYhVNpgso" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4CB9.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2908
-
-
C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2652
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD542f0a2169bb7c2df4510539dc5ccf788
SHA10fe8ca7a0efb815785b8fba748d4d59d91681d74
SHA256cde93f014b726da9d86dcd7503b6ac838db7c647a70cc938bfc33e7169a65bb7
SHA5124a7d606b7d81dd8ab89df3d50059616f3793024af2a05d8f0deeb06d48ae3db39f47a8da3f2a743e22dc35eb00919c30e49e7fbf67609b14b9b89586fb4382ef