Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
Order.exe
Resource
win7-20240729-en
General
-
Target
Order.exe
-
Size
1.2MB
-
MD5
dd6ab6cd17a66d48c5f1b61d8231505d
-
SHA1
36e490c417ab95e4878b29944566815da1095bac
-
SHA256
3065b2805c8d1f2fa4039d335a17855c65572f9fff179ddc5a279dd4bb7f58f0
-
SHA512
e336a6af2f39b038c1c8025e6d2d1d02c6f533939a86096c38c4e293ecd6abdc4abbf595c58411077cb2c7b4100787208ce5cd35becb12655d65d68b169476ae
-
SSDEEP
24576:PjAvRjwswHArvKQiUYbPcAJRKHhD+apppQ:Po51LKQ9YbZRKHE
Malware Config
Extracted
xloader
2.3
pz9b
gochili.info
cyberdatadefence.com
payonbux.com
candiceswanepoelbrasil.com
mykaoa.com
tanabe-kanagu.com
dovetailgoodlife.xyz
alabasterautomotive.com
tajc.club
authwdqtsi6sojynof9gmazon.com
cookingguides.net
yah360.com
berriq.com
freetoreview.online
yachtsgoneonline.com
clothestokidsri.com
howtogetstartedwithfba.com
simplepartyplanning.com
sunrisekai.com
wealthfarmer.net
indumaqservicios.com
sanookna.com
stgg.net
resultrun.info
dynamismedical.com
katfacecosmetics.com
wjlzbc.com
madebymygypsysoul.com
belpair.net
aktamusic.com
generationathletic.fitness
artandscience.info
timbisoaps.com
foursonsltd.com
komitmenindonesiasejahtera.com
buildingbusinessonline.net
nativeiso.com
sagalocal.icu
deepcombine.com
conecationsystemss.net
airtech-engineers.com
rjccollectibles.com
haegrumfood.com
brunchtimes.com
beautifulbodyz.com
vidaifriend.com
blinbins.com
cvnsm2020.com
thompsonwebmanagement.com
xn--lichthlzer-jcb.com
tyrellsaintvil.com
charismaadvice.com
webshopfront.com
creativesoulsclubs.com
schul-service.com
maridaniellecontreras.com
thefreelancerzone.com
1000-help4.club
thecookiechicktx.com
mutschein.com
balveny.com
sorteesportiva.bet
adamsandfane.com
ashleyjordanoutlaws.com
generalplex.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/3348-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3348-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/3428-24-0x0000000000F20000-0x0000000000F48000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2940 set thread context of 3348 2940 Order.exe 93 PID 3348 set thread context of 3468 3348 Order.exe 56 PID 3428 set thread context of 3468 3428 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 3348 Order.exe 3348 Order.exe 3348 Order.exe 3348 Order.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe 3428 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3348 Order.exe 3348 Order.exe 3348 Order.exe 3428 wlanext.exe 3428 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3348 Order.exe Token: SeDebugPrivilege 3428 wlanext.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2940 wrote to memory of 3348 2940 Order.exe 93 PID 2940 wrote to memory of 3348 2940 Order.exe 93 PID 2940 wrote to memory of 3348 2940 Order.exe 93 PID 2940 wrote to memory of 3348 2940 Order.exe 93 PID 2940 wrote to memory of 3348 2940 Order.exe 93 PID 2940 wrote to memory of 3348 2940 Order.exe 93 PID 3468 wrote to memory of 3428 3468 Explorer.EXE 94 PID 3468 wrote to memory of 3428 3468 Explorer.EXE 94 PID 3468 wrote to memory of 3428 3468 Explorer.EXE 94 PID 3428 wrote to memory of 2524 3428 wlanext.exe 95 PID 3428 wrote to memory of 2524 3428 wlanext.exe 95 PID 3428 wrote to memory of 2524 3428 wlanext.exe 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Order.exe"C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3428 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2524
-
-