Analysis
-
max time kernel
150s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
List of gchain fall hoist needed for quotes pdf.exe
Resource
win7-20240903-en
General
-
Target
List of gchain fall hoist needed for quotes pdf.exe
-
Size
930KB
-
MD5
53f4e52a78bdf6541e3efdaf401ebbd3
-
SHA1
9c4841f6dc393e0a197aba01e9cb8491999a6150
-
SHA256
0a92b6b6c9ccba573ca47718bf608715dbc87ad48afc19bf7004d8eb9bf598d0
-
SHA512
f14c3b7c53df876eae2d1ea6e03d88d419e91ee9926334993d585f470c4a13eaa1326544de95a0ce06d3b2590461b3ef52c988c8d1bde7e56ca6b49081305300
-
SSDEEP
12288:GMY3QedajfctobEgT4FtM/e2Rw4nZu4LvJ0BPykKu2sN9nuI:GMwdwOobfT4Foe2pLBuhN9n
Malware Config
Extracted
formbook
fofg
FHyydxpFBs0S8b4ZlP7ZEtd/
EVaCEKb/cVV9xQ==
U9I5lke0IuU7vj5EXus=
rXD3AKPV3qUblOUsV41KMfU=
PwBSy5z56XNzIvnS3ygsKv0=
CQe1BLbSnGXX
HuhKjxhLhxqBy2FFz8WoFA==
QJymezEoLOFZ1T5EXus=
V8r5PAdwuGK2AUARohas
b1XV06ANH9s5uj5EXus=
3EiEhwo7Euw2tl8=
c2PjK8Izkydy5N8x
CXCkYf0m/qPrv8QajKyT6Oo=
pHjy+Mk0CqvWBXdCz8WoFA==
QjSwr3/j5rAyvz5EXus=
+edxANg/sU+k8YFQz8WoFA==
tWiQq3rqyl6cTAG9pA==
GeAyMQxBUOlDwD5EXus=
nQ5eoT2mEKkhDN2DwBek
JP5dIbHlrXXR8umDwBek
BMT8B9n1OyBvqL+WUSgsKv0=
RSeJYDyteizAdQbSCyHeYCCMZL1A
NOgCENlCLthl5TV9YsWpTzHAdjCmUw==
s2npDaPJBhAdm10=
TXr1YfxiKOkqcgfcHV092XmTHA==
aTXN1nHe/gVFvD5EXus=
TS+nK+9V4pW+9cko
GuBk6sExhxNLr7wYhPbZEtd/
oHWjdWHDv228J/jg0q6xYvzLcxRiMhI=
z6pB06UWdBZHuj5EXus=
nZ7gYT4zv3fY
gXHxw16/sjbOAABSuAnZEtd/
m2asNcPsiDe3I27NxByg2XmTHA==
leg4fQ1h3ZG+9cko
AmB4B64SvFJ6t1G2z8WoFA==
7agWYtMw0Wu2yptkrA==
yzl7iRI/QhdFiRV+eQXh2qsEinZosxo=
gcntJ8YrjSVy5N8x
hmi6U/JgAY/CyptkrA==
/2edLM81848QdjaiqyLu051h
57A/tEumUOZ3Nc6c3Q/aQx8Hiq38AvyPxw==
qI77ulvxShNayD5EXus=
IPA6VOUd6xAdm10=
6LAL4bkhuGHG5+WDwBek
06pAU/Af78kc13PYvx2l2XmTHA==
LhRuu47pEuACWUo=
98ue7uq/cVV9xQ==
Vxxkh13O3ZwXwlcqp5L/6OM=
XhYUTkQR6hAdm10=
RQE/ijRllTFI8umlUSgsKv0=
+2bIH8U2olR6PVYuAlnzaCaMZL1A
BMQ9MRDgCcoYGZlxF2gFHXp1
fmrbKPeT/LD1azf/CIEZLeKVCw==
ajSLMtRD25W+9cko
8LTyD9cHcVV9xQ==
mFi1hCWOhw5Huj5EXus=
FXSUHb8h45vFyptkrA==
lWmcMf1mwF2BLzwh/FncUzfPgHZosxo=
guwbCaTRfBKGAXWKUHUf+e90detZ
QhxpJrXlmzdKeRDrnCjfixcSwulI
Thag+Y/veDtRAOqDwBek
Z0Wp7pLMCBAdm10=
bT9HyWnOXhWYztVF4moy2XmTHA==
kXbZHKvU/Iq+9cko
richardcrebeck.com
Extracted
xloader
2.9
fofg
FHyydxpFBs0S8b4ZlP7ZEtd/
EVaCEKb/cVV9xQ==
U9I5lke0IuU7vj5EXus=
rXD3AKPV3qUblOUsV41KMfU=
PwBSy5z56XNzIvnS3ygsKv0=
CQe1BLbSnGXX
HuhKjxhLhxqBy2FFz8WoFA==
QJymezEoLOFZ1T5EXus=
V8r5PAdwuGK2AUARohas
b1XV06ANH9s5uj5EXus=
3EiEhwo7Euw2tl8=
c2PjK8Izkydy5N8x
CXCkYf0m/qPrv8QajKyT6Oo=
pHjy+Mk0CqvWBXdCz8WoFA==
QjSwr3/j5rAyvz5EXus=
+edxANg/sU+k8YFQz8WoFA==
tWiQq3rqyl6cTAG9pA==
GeAyMQxBUOlDwD5EXus=
nQ5eoT2mEKkhDN2DwBek
JP5dIbHlrXXR8umDwBek
BMT8B9n1OyBvqL+WUSgsKv0=
RSeJYDyteizAdQbSCyHeYCCMZL1A
NOgCENlCLthl5TV9YsWpTzHAdjCmUw==
s2npDaPJBhAdm10=
TXr1YfxiKOkqcgfcHV092XmTHA==
aTXN1nHe/gVFvD5EXus=
TS+nK+9V4pW+9cko
GuBk6sExhxNLr7wYhPbZEtd/
oHWjdWHDv228J/jg0q6xYvzLcxRiMhI=
z6pB06UWdBZHuj5EXus=
nZ7gYT4zv3fY
gXHxw16/sjbOAABSuAnZEtd/
m2asNcPsiDe3I27NxByg2XmTHA==
leg4fQ1h3ZG+9cko
AmB4B64SvFJ6t1G2z8WoFA==
7agWYtMw0Wu2yptkrA==
yzl7iRI/QhdFiRV+eQXh2qsEinZosxo=
gcntJ8YrjSVy5N8x
hmi6U/JgAY/CyptkrA==
/2edLM81848QdjaiqyLu051h
57A/tEumUOZ3Nc6c3Q/aQx8Hiq38AvyPxw==
qI77ulvxShNayD5EXus=
IPA6VOUd6xAdm10=
6LAL4bkhuGHG5+WDwBek
06pAU/Af78kc13PYvx2l2XmTHA==
LhRuu47pEuACWUo=
98ue7uq/cVV9xQ==
Vxxkh13O3ZwXwlcqp5L/6OM=
XhYUTkQR6hAdm10=
RQE/ijRllTFI8umlUSgsKv0=
+2bIH8U2olR6PVYuAlnzaCaMZL1A
BMQ9MRDgCcoYGZlxF2gFHXp1
fmrbKPeT/LD1azf/CIEZLeKVCw==
ajSLMtRD25W+9cko
8LTyD9cHcVV9xQ==
mFi1hCWOhw5Huj5EXus=
FXSUHb8h45vFyptkrA==
lWmcMf1mwF2BLzwh/FncUzfPgHZosxo=
guwbCaTRfBKGAXWKUHUf+e90detZ
QhxpJrXlmzdKeRDrnCjfixcSwulI
Thag+Y/veDtRAOqDwBek
Z0Wp7pLMCBAdm10=
bT9HyWnOXhWYztVF4moy2XmTHA==
kXbZHKvU/Iq+9cko
richardcrebeck.com
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2616-15-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/2616-20-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/2616-23-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral1/memory/556-29-0x0000000000080000-0x00000000000AC000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-1488793075-819845221-1497111674-1000\Control Panel\International\Geo\Nation List of gchain fall hoist needed for quotes pdf.exe -
Deletes itself 1 IoCs
pid Process 2864 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3016 set thread context of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 2616 set thread context of 1196 2616 List of gchain fall hoist needed for quotes pdf.exe 21 PID 2616 set thread context of 1196 2616 List of gchain fall hoist needed for quotes pdf.exe 21 PID 556 set thread context of 1196 556 systray.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language List of gchain fall hoist needed for quotes pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language systray.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 3016 List of gchain fall hoist needed for quotes pdf.exe 3016 List of gchain fall hoist needed for quotes pdf.exe 3016 List of gchain fall hoist needed for quotes pdf.exe 3016 List of gchain fall hoist needed for quotes pdf.exe 3016 List of gchain fall hoist needed for quotes pdf.exe 3016 List of gchain fall hoist needed for quotes pdf.exe 2616 List of gchain fall hoist needed for quotes pdf.exe 2616 List of gchain fall hoist needed for quotes pdf.exe 2616 List of gchain fall hoist needed for quotes pdf.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe 556 systray.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2616 List of gchain fall hoist needed for quotes pdf.exe 2616 List of gchain fall hoist needed for quotes pdf.exe 2616 List of gchain fall hoist needed for quotes pdf.exe 2616 List of gchain fall hoist needed for quotes pdf.exe 556 systray.exe 556 systray.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3016 List of gchain fall hoist needed for quotes pdf.exe Token: SeDebugPrivilege 2616 List of gchain fall hoist needed for quotes pdf.exe Token: SeDebugPrivilege 556 systray.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 3016 wrote to memory of 2616 3016 List of gchain fall hoist needed for quotes pdf.exe 31 PID 1196 wrote to memory of 556 1196 Explorer.EXE 32 PID 1196 wrote to memory of 556 1196 Explorer.EXE 32 PID 1196 wrote to memory of 556 1196 Explorer.EXE 32 PID 1196 wrote to memory of 556 1196 Explorer.EXE 32 PID 556 wrote to memory of 2864 556 systray.exe 33 PID 556 wrote to memory of 2864 556 systray.exe 33 PID 556 wrote to memory of 2864 556 systray.exe 33 PID 556 wrote to memory of 2864 556 systray.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2616
-
-
-
C:\Windows\SysWOW64\systray.exe"C:\Windows\SysWOW64\systray.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2864
-
-