Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240729-en
General
-
Target
Order.exe
-
Size
1.2MB
-
MD5
dd6ab6cd17a66d48c5f1b61d8231505d
-
SHA1
36e490c417ab95e4878b29944566815da1095bac
-
SHA256
3065b2805c8d1f2fa4039d335a17855c65572f9fff179ddc5a279dd4bb7f58f0
-
SHA512
e336a6af2f39b038c1c8025e6d2d1d02c6f533939a86096c38c4e293ecd6abdc4abbf595c58411077cb2c7b4100787208ce5cd35becb12655d65d68b169476ae
-
SSDEEP
24576:PjAvRjwswHArvKQiUYbPcAJRKHhD+apppQ:Po51LKQ9YbZRKHE
Malware Config
Extracted
xloader
2.3
pz9b
gochili.info
cyberdatadefence.com
payonbux.com
candiceswanepoelbrasil.com
mykaoa.com
tanabe-kanagu.com
dovetailgoodlife.xyz
alabasterautomotive.com
tajc.club
authwdqtsi6sojynof9gmazon.com
cookingguides.net
yah360.com
berriq.com
freetoreview.online
yachtsgoneonline.com
clothestokidsri.com
howtogetstartedwithfba.com
simplepartyplanning.com
sunrisekai.com
wealthfarmer.net
indumaqservicios.com
sanookna.com
stgg.net
resultrun.info
dynamismedical.com
katfacecosmetics.com
wjlzbc.com
madebymygypsysoul.com
belpair.net
aktamusic.com
generationathletic.fitness
artandscience.info
timbisoaps.com
foursonsltd.com
komitmenindonesiasejahtera.com
buildingbusinessonline.net
nativeiso.com
sagalocal.icu
deepcombine.com
conecationsystemss.net
airtech-engineers.com
rjccollectibles.com
haegrumfood.com
brunchtimes.com
beautifulbodyz.com
vidaifriend.com
blinbins.com
cvnsm2020.com
thompsonwebmanagement.com
xn--lichthlzer-jcb.com
tyrellsaintvil.com
charismaadvice.com
webshopfront.com
creativesoulsclubs.com
schul-service.com
maridaniellecontreras.com
thefreelancerzone.com
1000-help4.club
thecookiechicktx.com
mutschein.com
balveny.com
sorteesportiva.bet
adamsandfane.com
ashleyjordanoutlaws.com
generalplex.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2752-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2752-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/3028-21-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2656 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2436 set thread context of 2752 2436 Order.exe 31 PID 2752 set thread context of 1200 2752 Order.exe 21 PID 3028 set thread context of 1200 3028 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2752 Order.exe 2752 Order.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe 3028 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2752 Order.exe 2752 Order.exe 2752 Order.exe 3028 chkdsk.exe 3028 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2752 Order.exe Token: SeDebugPrivilege 3028 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 2436 wrote to memory of 2752 2436 Order.exe 31 PID 1200 wrote to memory of 3028 1200 Explorer.EXE 32 PID 1200 wrote to memory of 3028 1200 Explorer.EXE 32 PID 1200 wrote to memory of 3028 1200 Explorer.EXE 32 PID 1200 wrote to memory of 3028 1200 Explorer.EXE 32 PID 3028 wrote to memory of 2656 3028 chkdsk.exe 33 PID 3028 wrote to memory of 2656 3028 chkdsk.exe 33 PID 3028 wrote to memory of 2656 3028 chkdsk.exe 33 PID 3028 wrote to memory of 2656 3028 chkdsk.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2752
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2656
-
-