Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FACTURA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/772vhhojj684oi.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/772vhhojj684oi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
URGENT Request for Quotation.pdf.exe
Resource
win7-20240903-en
General
-
Target
FACTURA.exe
-
Size
259KB
-
MD5
dbe8f4544e6c99ac9311d37139150e9a
-
SHA1
14da5f434e987b372a2e783d49134877bcce9ebe
-
SHA256
c3192d94f1b44c9c8ce94f3865d88b1a169dde10f3dadf3a517c3de34487a5a5
-
SHA512
25a785d5d9cd19bf0e9805dee79433140de4cd5fc3384e292ec6421089f0560fdb44fcb0a2eed8a2774f9d3a89a6c30b5cc1248756d3b44125e478bc991e8a41
-
SSDEEP
3072:7Ere7GjyCaFvcm6kDbv4cYMzwdr74NVwfuSJZKSCKwlZGFs/LOC8sTkZtcEPE3fV:7PXz3AcYVaeuS7K/K6ZGVzZtNE3rZ
Malware Config
Extracted
xloader
2.3
u8nw
constructionjadams.com
organicwellnessfarm.com
beautiful.tours
medvows.com
foxparanormal.com
fsmxmc.com
graniterealestategroup.net
qgi1.com
astrologicsolutions.com
rafbar.com
bastiontools.net
emotist.com
stacyleets.com
bloodtypealpha.com
healtybenenfitsplus.com
vavadadoa3.com
chefbenhk.com
dotgz.com
xn--z4qm188e645c.com
ethyi.com
farrellforcouncil.com
everythingcornea.com
pensje.net
haichuanxin.com
codeproper.com
beautyblvdca.com
namastecarrier.com
xtrator.com
alphabrainbalancing.com
sensationalcleaningservices.net
magistv.info
shotsbynox.com
zioninfosystems.net
yourstoryplace.com
ebmulla.com
turkeyvisa-government.com
albertsonsolutions.com
7brochasmagicas.com
revolutiontourselsalvador.com
eastboundanddowntrucking.com
jkskylights.com
ultimatepoolwater.com
diurr.com
investmentfocused.com
dogscanstay.com
inov8digital.com
paragoncraftevents.com
reservesunbeds.com
melaniesalascosmetics.com
vissito.com
axolc-upoc.xyz
customessayjojo.com
kladki.com
online-securegov.com
xn--demirelik-u3a.com
plgmap.com
contorig2.com
dgyzgs8.com
valuedmind.com
sanacolitademarijuana.com
xn--6j1bs50berk.com
labkitsforstudents.com
lifehakershagirl.online
candidanddevout.com
onyxcomputing.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2360-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2360-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2664-18-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2624 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
FACTURA.exepid process 1504 FACTURA.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
FACTURA.exeFACTURA.execscript.exedescription pid process target process PID 1504 set thread context of 2360 1504 FACTURA.exe FACTURA.exe PID 2360 set thread context of 1184 2360 FACTURA.exe Explorer.EXE PID 2664 set thread context of 1184 2664 cscript.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
FACTURA.execscript.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language FACTURA.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
FACTURA.execscript.exepid process 2360 FACTURA.exe 2360 FACTURA.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe 2664 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
FACTURA.exeFACTURA.execscript.exepid process 1504 FACTURA.exe 2360 FACTURA.exe 2360 FACTURA.exe 2360 FACTURA.exe 2664 cscript.exe 2664 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
FACTURA.execscript.exedescription pid process Token: SeDebugPrivilege 2360 FACTURA.exe Token: SeDebugPrivilege 2664 cscript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
FACTURA.exeExplorer.EXEcscript.exedescription pid process target process PID 1504 wrote to memory of 2360 1504 FACTURA.exe FACTURA.exe PID 1504 wrote to memory of 2360 1504 FACTURA.exe FACTURA.exe PID 1504 wrote to memory of 2360 1504 FACTURA.exe FACTURA.exe PID 1504 wrote to memory of 2360 1504 FACTURA.exe FACTURA.exe PID 1504 wrote to memory of 2360 1504 FACTURA.exe FACTURA.exe PID 1184 wrote to memory of 2664 1184 Explorer.EXE cscript.exe PID 1184 wrote to memory of 2664 1184 Explorer.EXE cscript.exe PID 1184 wrote to memory of 2664 1184 Explorer.EXE cscript.exe PID 1184 wrote to memory of 2664 1184 Explorer.EXE cscript.exe PID 2664 wrote to memory of 2624 2664 cscript.exe cmd.exe PID 2664 wrote to memory of 2624 2664 cscript.exe cmd.exe PID 2664 wrote to memory of 2624 2664 cscript.exe cmd.exe PID 2664 wrote to memory of 2624 2664 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\FACTURA.exe"C:\Users\Admin\AppData\Local\Temp\FACTURA.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\FACTURA.exe"C:\Users\Admin\AppData\Local\Temp\FACTURA.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\FACTURA.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD55e3d3dadd742c63f01034fb9175caef2
SHA1a3c3cdd8ba24655f36ef248678efe1fade8bc6e8
SHA256c5e4e3bca252502d2c1b4dd9af51de6f14f495b97965e6f0cb9689ce2501afe1
SHA5126d19e6f22dd4442baf620111e4370ebe83acde452240dfb171c6492051f9cbede8d1c0a7de538d012e20ef98e07d61ed1e126050a890425f4a868f27a4d66440