Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:37
Static task
static1
Behavioral task
behavioral1
Sample
RFQ0473838383.exe
Resource
win7-20240729-en
General
-
Target
RFQ0473838383.exe
-
Size
628KB
-
MD5
315b261c58696e588523ef02adefb688
-
SHA1
ba05bf49eddd3525b6bdf3b6700716bac07340bf
-
SHA256
e9a323cf1693e3ade91d24bd4cb4e9f976f905d9fbcd695dc99f6e8005b9680c
-
SHA512
10cbc5f94941aa5da2d277177176bbdf21b118b77ebb78baf9a9f14859ce5ae7a0bb7560b2c76900723a96c839c72ee937dfe1e7fad6f65bb0b72606c8ffef52
-
SSDEEP
12288:XODQzJ40CAH7yWEv85imatc0W75RVdtTg3LEFaUuQcbuv/VCk2AlCcasUo:+8Fd7yNDttc0WrlsLicdCv/Vf2HcasU
Malware Config
Extracted
xloader
2.5
iaop
oosakichi.com
group1beadles.com
navegadorexclusivo.digital
awefca.xyz
strakerwilliams.com
stone-img.com
radialodge.com
tequesquitengo.net
humanegardens.com
rubberyporqjp.xyz
farazkhak.com
gfsexpornvideos.com
stealth-carrier.com
hemtpi.xyz
tygcj.com
agileiance.com
ioan316.com
kitchendesigns.xyz
shannacarolphotography.com
oheytech88.net
dashiter.com
zijinmenhu.com
dmfiller.com
amberchee.com
farmaciaepspllu.com
help-kmcsupport.com
naxek.com
yuumgo.academy
baopishuizhong.com
appcast-64.com
vpm-vektra.com
privygym.com
texascyclerepair.com
queerstakepool.com
maxicashprokil.xyz
enchantbnuyxc.xyz
heyunshangcheng.info
blockchainsupport.company
consultoriathayanechlad.com
cigreencig.com
enriquelopez.net
ultimateexitstrategy.com
jesuspodcast.biz
wecuxs.com
louroblottoyof2.xyz
12monthmillionairetraining.com
autoecoleamiens.com
kokko-kids.com
uniquecarbonbrush.com
fardaruilen.quest
generalcontractortheodoreal.com
kare-furniture.com
odnglobal.com
rihaltravels.com
jdlpcpa.com
websupportoutlook.com
sonyagivensrealty.com
johnmcnamaraimages.net
fa7777.xyz
northvisiondigital.com
docteurhouyengah.com
contactcenter7.email
lebenohnefleisch.com
sign-egypt.com
georgeinnhatherleigh.com
Signatures
-
Xloader family
-
Looks for VirtualBox Guest Additions in registry 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Oracle\VirtualBox Guest Additions RFQ0473838383.exe -
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/3032-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/3032-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1984-20-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2632 powershell.exe -
Looks for VMWare Tools registry key 2 TTPs 1 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\VMware, Inc.\VMware Tools RFQ0473838383.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion RFQ0473838383.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion RFQ0473838383.exe -
Deletes itself 1 IoCs
pid Process 1608 cmd.exe -
Maps connected drives based on registry 3 TTPs 2 IoCs
Disk information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Disk\Enum RFQ0473838383.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\Disk\Enum\0 RFQ0473838383.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2548 set thread context of 3032 2548 RFQ0473838383.exe 32 PID 3032 set thread context of 1212 3032 RFQ0473838383.exe 20 PID 3032 set thread context of 1212 3032 RFQ0473838383.exe 20 PID 1984 set thread context of 1212 1984 cmmon32.exe 20 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ0473838383.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
pid Process 3032 RFQ0473838383.exe 2632 powershell.exe 3032 RFQ0473838383.exe 3032 RFQ0473838383.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe 1984 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3032 RFQ0473838383.exe 3032 RFQ0473838383.exe 3032 RFQ0473838383.exe 3032 RFQ0473838383.exe 1984 cmmon32.exe 1984 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3032 RFQ0473838383.exe Token: SeDebugPrivilege 2632 powershell.exe Token: SeDebugPrivilege 1984 cmmon32.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2548 wrote to memory of 2632 2548 RFQ0473838383.exe 29 PID 2548 wrote to memory of 2632 2548 RFQ0473838383.exe 29 PID 2548 wrote to memory of 2632 2548 RFQ0473838383.exe 29 PID 2548 wrote to memory of 2632 2548 RFQ0473838383.exe 29 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 2548 wrote to memory of 3032 2548 RFQ0473838383.exe 32 PID 1212 wrote to memory of 1984 1212 Explorer.EXE 33 PID 1212 wrote to memory of 1984 1212 Explorer.EXE 33 PID 1212 wrote to memory of 1984 1212 Explorer.EXE 33 PID 1212 wrote to memory of 1984 1212 Explorer.EXE 33 PID 1984 wrote to memory of 1608 1984 cmmon32.exe 34 PID 1984 wrote to memory of 1608 1984 cmmon32.exe 34 PID 1984 wrote to memory of 1608 1984 cmmon32.exe 34 PID 1984 wrote to memory of 1608 1984 cmmon32.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\RFQ0473838383.exe"C:\Users\Admin\AppData\Local\Temp\RFQ0473838383.exe"2⤵
- Looks for VirtualBox Guest Additions in registry
- Looks for VMWare Tools registry key
- Checks BIOS information in registry
- Maps connected drives based on registry
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\RFQ0473838383.exe"3⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2632
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ0473838383.exe"C:\Users\Admin\AppData\Local\Temp\RFQ0473838383.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ0473838383.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1608
-
-