Analysis
-
max time kernel
146s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
2 months salary receipt.exe
Resource
win7-20241010-en
General
-
Target
2 months salary receipt.exe
-
Size
318KB
-
MD5
39a410d21ad5980790d452986c2ea66c
-
SHA1
7812690099a0f3affd68c9a61d383e6ba1885659
-
SHA256
3a52310de39c5fcde9a4497c2393f6d21581b14b191cf377bf9588f08312572c
-
SHA512
d32ea0f52be61c0d4048ce64f4b6fb130b5097b355cb7e46ef9aef07b3cefef374a3074dfc7211f1e7d15180f091728893f432b02c877c197a5b288dcfa18d66
-
SSDEEP
6144:bi0qkSQYhZeTtORPQ/KhtjPhrIqZIf/OKQoAY:yJfeTtmSKhtPPKQof
Malware Config
Extracted
xloader
2.5
rugs
modktchn.com
autoairplay.com
gadgetvictory.com
view-one.online
green-zen.club
xysgsjc.com
unikokitchen-usa.com
arteologia.store
clearing.global
metaelectron.com
eldovera.com
mcftaxacct.com
mainlinepak.com
flawlessvn.online
ureumpomp.com
loribethperez.com
willahandcreations.com
fileextensiondownload.com
dadsgametoo.com
dolphinec.com
zhonghongfu.com
judgenonethelesswithout.xyz
biofo.net
openthemenu.com
privateschoolsofmanila.com
briskmator.com
insulinworld.com
b15cb.com
productshopify.store
admdisenarte.com
kraines3.com
ytwyguck.com
builddigitalwealth.com
wrenrock.com
voilathefamilyrecipeguide.com
seventyfivedegrees.com
pluslinked.net
webthecloud.com
weefun.net
poltronapuffgigante.com
verabellahomes.com
pascal.support
accessorieswithpassion.com
cachiausa.com
dazzleyourtravel.com
poshpeds.com
historicalcharacter.com
cemexpmo.net
sandman.network
tpaz2.xyz
m-intlservices.com
roscoemoss.store
myfinnies.com
sumiyoshiku-kyousakusyo.xyz
centraliaapartment.com
danielleprofessionelle.com
yuejing100.com
nowidza.com
nexum-m.com
actspeak.com
okboomermoto.com
kitchensinkpie.com
marsaliving.com
taxiencadiz.com
572891.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2548-9-0x0000000000080000-0x00000000000A9000-memory.dmp xloader behavioral1/memory/2548-13-0x0000000000080000-0x00000000000A9000-memory.dmp xloader behavioral1/memory/2448-18-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Uses the VBS compiler for execution 1 TTPs
-
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1960 set thread context of 2548 1960 2 months salary receipt.exe 31 PID 2548 set thread context of 1388 2548 vbc.exe 21 PID 2448 set thread context of 1388 2448 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2 months salary receipt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 30 IoCs
pid Process 2548 vbc.exe 2548 vbc.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe 2448 explorer.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2548 vbc.exe 2548 vbc.exe 2548 vbc.exe 2448 explorer.exe 2448 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2548 vbc.exe Token: SeDebugPrivilege 2448 explorer.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1960 wrote to memory of 2548 1960 2 months salary receipt.exe 31 PID 1388 wrote to memory of 2448 1388 Explorer.EXE 32 PID 1388 wrote to memory of 2448 1388 Explorer.EXE 32 PID 1388 wrote to memory of 2448 1388 Explorer.EXE 32 PID 1388 wrote to memory of 2448 1388 Explorer.EXE 32 PID 2448 wrote to memory of 2724 2448 explorer.exe 33 PID 2448 wrote to memory of 2724 2448 explorer.exe 33 PID 2448 wrote to memory of 2724 2448 explorer.exe 33 PID 2448 wrote to memory of 2724 2448 explorer.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\2 months salary receipt.exe"C:\Users\Admin\AppData\Local\Temp\2 months salary receipt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2548
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2724
-
-