Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_AP65425652_032421 urgentes,pdf.exe
Resource
win7-20240903-en
General
-
Target
RFQ_AP65425652_032421 urgentes,pdf.exe
-
Size
834KB
-
MD5
6324862ccd183522472fedbe3901d267
-
SHA1
46b1718671e662b34d903eb9acf2cc09ef893ff6
-
SHA256
1da66787bac6e2293792bf1f2d262c9d587b1fb63084ec6afff294b79c208014
-
SHA512
e69e3ef927121ba5c89270a2d7a1ce0f5b367ddac4fc7f3aecb32b47722083d3aa437995d7766f99138f172f30b628cc806f786b916a897bff3145db8c6943df
-
SSDEEP
24576:IehAesJPxtoGyiI7bMQVtbl1wm9YL44Mwv5N:IehAe0toGqbMQVtbl1wmuc4H
Malware Config
Extracted
xloader
2.3
pe0r
quickeasybites.com
idilecup.com
atelierdusalon.com
tigerking-safe.com
goinyourstrength.com
ssfgasia.com
halmanseger.com
hpcovn.com
thegodfatherricedealer.com
hzmsbg.com
trickswithwix.com
rbvctiu.com
spystoredevices.com
monlexiem.com
apt-forward.com
medsez.cloud
nanantz.com
kf350.com
ztvwgqjya.com
countingeverything.com
motion-mill-tv.com
mex33.info
desertfoxindustries.com
welchmanlongbow.com
beachnovotel.com
basicchan.com
boekhoudingwetteren.com
pierresplayhouse.com
xitiefilm.com
betterskindays.com
hdeamutfak.com
sqjqw4.com
coloradocouponclub.com
leadershipcodes.com
simplysouthdisinfecting.net
lideresdeimmunocal.com
tipsaglik.com
greaterluxuryrehab.info
tennesseewheelrepair.com
5150shoshone.com
slot-782.com
cubitia.net
fudweisj.icu
forguyshere.com
connect-alert-status.network
hannahkaylewis.com
soarcredits.com
queensindustrial.com
kudzuentertains.com
maconhemorrhoidcenter.com
1364kensington.com
prestamosa.com
lifeisgoingwells.com
cloverunner.com
4608capaydrive.com
neomily.xyz
blushingdevil.com
essentials-trading.com
theinfoinsider.com
heftylefties.com
zea-px16z.net
thecapitalhut.com
rootedwithlovejax.com
nesreenibrahimmd.com
luegomusic.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/1860-3-0x0000000000830000-0x000000000083A000-memory.dmp CustAttr -
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/1484-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1484-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1484-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/764-27-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1336 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1860 set thread context of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1484 set thread context of 1212 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 21 PID 1484 set thread context of 1212 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 21 PID 764 set thread context of 1212 764 cscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_AP65425652_032421 urgentes,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 764 cscript.exe 764 cscript.exe 764 cscript.exe 764 cscript.exe 764 cscript.exe 764 cscript.exe 764 cscript.exe 764 cscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 1484 RFQ_AP65425652_032421 urgentes,pdf.exe 764 cscript.exe 764 cscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1860 RFQ_AP65425652_032421 urgentes,pdf.exe Token: SeDebugPrivilege 1484 RFQ_AP65425652_032421 urgentes,pdf.exe Token: SeDebugPrivilege 764 cscript.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1860 wrote to memory of 1660 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 30 PID 1860 wrote to memory of 1660 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 30 PID 1860 wrote to memory of 1660 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 30 PID 1860 wrote to memory of 1660 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 30 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1860 wrote to memory of 1484 1860 RFQ_AP65425652_032421 urgentes,pdf.exe 31 PID 1212 wrote to memory of 764 1212 Explorer.EXE 32 PID 1212 wrote to memory of 764 1212 Explorer.EXE 32 PID 1212 wrote to memory of 764 1212 Explorer.EXE 32 PID 1212 wrote to memory of 764 1212 Explorer.EXE 32 PID 764 wrote to memory of 1336 764 cscript.exe 33 PID 764 wrote to memory of 1336 764 cscript.exe 33 PID 764 wrote to memory of 1336 764 cscript.exe 33 PID 764 wrote to memory of 1336 764 cscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"3⤵PID:1660
-
-
C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1484
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1336
-
-