Analysis
-
max time kernel
147s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
2021-04-18947 OC INVERSIONES RIVASOL PDF.exe
Resource
win7-20241023-en
General
-
Target
2021-04-18947 OC INVERSIONES RIVASOL PDF.exe
-
Size
844KB
-
MD5
e12a4d95a3ee125919a807f7913b19e6
-
SHA1
a026aa3538d4580c55d4816ef580d96ae9951788
-
SHA256
b13a9b07dcfd6677e3092a0cae29b08487bb56d12345f3bd13931f2887b1738c
-
SHA512
c4479179a68c9e0f921f35fa7158a91199697f807b36a2d1704c6e34f74770965113c296d5e93ce0a827db9100fa60e4fd07c8bf40ac49c89c260689036ecb37
-
SSDEEP
12288:Y6VhCe+/DPYjaV3m9O2SSIuHwwHjdlnd5gzKa9TEFLYjP+osyn12G1Ps0heGdMGB:YbRjYn9OxSTp7QKiDqR4bnhemt
Malware Config
Extracted
xloader
2.3
rbpi
la-beaute-de-jade.com
sipsiew.com
hhshowstock.com
csxcdz.com
letsgetsocialconsulting.com
projectcleverweb.com
curiget.xyz
isearchjokes.com
smkpgri35jakarta.store
racismratingssystem.net
passivefiresafe.com
warpkings.com
52cbb.com
healthcential.com
kino-hd720.net
guochaocha.com
highseachartersct.com
voteformarc.com
mmcaraccessories.com
forevermusicgoup.com
dodlasu.com
gratitudegypsy.com
inflateballoons.com
jiese.info
fessuseseyye.com
internationalclaim.com
reluctantentainer.com
wwwhappyplantspty.com
huskemawcanada.com
lesbian-videos.online
mezopotamya.info
link2cell.com
omesapaint.com
advflags.com
tehrantechnique.com
teachertricia.com
electric-sauna.com
ronaldcraig.com
earninemploymentconnector.com
turuicb.com
fearlessrolls.com
cresco-company.com
zoeyrosen.com
goedsteen.com
caiyi886.com
911waterheatermissouricity.com
we-can-app.com
lynnwoodbeautysalon.com
geneticparadisellc.com
rootcoderpanel.com
daji668.com
apkplasticmachines.com
ahwareness.com
trivalleytek.com
mattesonauto.com
breannandgilbert.com
telefonosat.com
homebodyhealthcoach.com
watora.space
boldcalc.com
wateredgeproperties.com
mtesportes.club
henhenri3.com
yzyl688.com
poseidonodesign.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1268-4-0x0000000000580000-0x000000000058A000-memory.dmp CustAttr -
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/1500-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1500-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1500-24-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1740-31-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 3060 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1268 set thread context of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1500 set thread context of 1212 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 21 PID 1500 set thread context of 1212 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 21 PID 1740 set thread context of 1212 1740 help.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1740 help.exe 1740 help.exe 1740 help.exe 1740 help.exe 1740 help.exe 1740 help.exe 1740 help.exe 1740 help.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 1740 help.exe 1740 help.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe Token: SeDebugPrivilege 1500 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe Token: SeDebugPrivilege 1740 help.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1268 wrote to memory of 1500 1268 2021-04-18947 OC INVERSIONES RIVASOL PDF.exe 32 PID 1212 wrote to memory of 1740 1212 Explorer.EXE 34 PID 1212 wrote to memory of 1740 1212 Explorer.EXE 34 PID 1212 wrote to memory of 1740 1212 Explorer.EXE 34 PID 1212 wrote to memory of 1740 1212 Explorer.EXE 34 PID 1740 wrote to memory of 3060 1740 help.exe 35 PID 1740 wrote to memory of 3060 1740 help.exe 35 PID 1740 wrote to memory of 3060 1740 help.exe 35 PID 1740 wrote to memory of 3060 1740 help.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\2021-04-18947 OC INVERSIONES RIVASOL PDF.exe"C:\Users\Admin\AppData\Local\Temp\2021-04-18947 OC INVERSIONES RIVASOL PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\2021-04-18947 OC INVERSIONES RIVASOL PDF.exe"C:\Users\Admin\AppData\Local\Temp\2021-04-18947 OC INVERSIONES RIVASOL PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1500
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:2992
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\2021-04-18947 OC INVERSIONES RIVASOL PDF.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:3060
-
-