Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:43
Static task
static1
Behavioral task
behavioral1
Sample
RFQ_AP65425652_032421 urgentes,pdf.exe
Resource
win7-20240903-en
General
-
Target
RFQ_AP65425652_032421 urgentes,pdf.exe
-
Size
834KB
-
MD5
6324862ccd183522472fedbe3901d267
-
SHA1
46b1718671e662b34d903eb9acf2cc09ef893ff6
-
SHA256
1da66787bac6e2293792bf1f2d262c9d587b1fb63084ec6afff294b79c208014
-
SHA512
e69e3ef927121ba5c89270a2d7a1ce0f5b367ddac4fc7f3aecb32b47722083d3aa437995d7766f99138f172f30b628cc806f786b916a897bff3145db8c6943df
-
SSDEEP
24576:IehAesJPxtoGyiI7bMQVtbl1wm9YL44Mwv5N:IehAe0toGqbMQVtbl1wmuc4H
Malware Config
Extracted
xloader
2.3
pe0r
quickeasybites.com
idilecup.com
atelierdusalon.com
tigerking-safe.com
goinyourstrength.com
ssfgasia.com
halmanseger.com
hpcovn.com
thegodfatherricedealer.com
hzmsbg.com
trickswithwix.com
rbvctiu.com
spystoredevices.com
monlexiem.com
apt-forward.com
medsez.cloud
nanantz.com
kf350.com
ztvwgqjya.com
countingeverything.com
motion-mill-tv.com
mex33.info
desertfoxindustries.com
welchmanlongbow.com
beachnovotel.com
basicchan.com
boekhoudingwetteren.com
pierresplayhouse.com
xitiefilm.com
betterskindays.com
hdeamutfak.com
sqjqw4.com
coloradocouponclub.com
leadershipcodes.com
simplysouthdisinfecting.net
lideresdeimmunocal.com
tipsaglik.com
greaterluxuryrehab.info
tennesseewheelrepair.com
5150shoshone.com
slot-782.com
cubitia.net
fudweisj.icu
forguyshere.com
connect-alert-status.network
hannahkaylewis.com
soarcredits.com
queensindustrial.com
kudzuentertains.com
maconhemorrhoidcenter.com
1364kensington.com
prestamosa.com
lifeisgoingwells.com
cloverunner.com
4608capaydrive.com
neomily.xyz
blushingdevil.com
essentials-trading.com
theinfoinsider.com
heftylefties.com
zea-px16z.net
thecapitalhut.com
rootedwithlovejax.com
nesreenibrahimmd.com
luegomusic.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3992-9-0x0000000005FA0000-0x0000000005FAA000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4380-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4380-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4100-24-0x0000000000340000-0x0000000000369000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3992 set thread context of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 4380 set thread context of 3540 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 56 PID 4100 set thread context of 3540 4100 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RFQ_AP65425652_032421 urgentes,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 4100 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE 4100 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4380 RFQ_AP65425652_032421 urgentes,pdf.exe 4100 NETSTAT.EXE 4100 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3992 RFQ_AP65425652_032421 urgentes,pdf.exe Token: SeDebugPrivilege 4380 RFQ_AP65425652_032421 urgentes,pdf.exe Token: SeDebugPrivilege 4100 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3992 wrote to memory of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 3992 wrote to memory of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 3992 wrote to memory of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 3992 wrote to memory of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 3992 wrote to memory of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 3992 wrote to memory of 4380 3992 RFQ_AP65425652_032421 urgentes,pdf.exe 100 PID 3540 wrote to memory of 4100 3540 Explorer.EXE 101 PID 3540 wrote to memory of 4100 3540 Explorer.EXE 101 PID 3540 wrote to memory of 4100 3540 Explorer.EXE 101 PID 4100 wrote to memory of 2240 4100 NETSTAT.EXE 102 PID 4100 wrote to memory of 2240 4100 NETSTAT.EXE 102 PID 4100 wrote to memory of 2240 4100 NETSTAT.EXE 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3992 -
C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\RFQ_AP65425652_032421 urgentes,pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2240
-
-