Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
List of gchain fall hoist needed for quotes pdf.exe
Resource
win7-20240903-en
General
-
Target
List of gchain fall hoist needed for quotes pdf.exe
-
Size
930KB
-
MD5
53f4e52a78bdf6541e3efdaf401ebbd3
-
SHA1
9c4841f6dc393e0a197aba01e9cb8491999a6150
-
SHA256
0a92b6b6c9ccba573ca47718bf608715dbc87ad48afc19bf7004d8eb9bf598d0
-
SHA512
f14c3b7c53df876eae2d1ea6e03d88d419e91ee9926334993d585f470c4a13eaa1326544de95a0ce06d3b2590461b3ef52c988c8d1bde7e56ca6b49081305300
-
SSDEEP
12288:GMY3QedajfctobEgT4FtM/e2Rw4nZu4LvJ0BPykKu2sN9nuI:GMwdwOobfT4Foe2pLBuhN9n
Malware Config
Extracted
formbook
fofg
FHyydxpFBs0S8b4ZlP7ZEtd/
EVaCEKb/cVV9xQ==
U9I5lke0IuU7vj5EXus=
rXD3AKPV3qUblOUsV41KMfU=
PwBSy5z56XNzIvnS3ygsKv0=
CQe1BLbSnGXX
HuhKjxhLhxqBy2FFz8WoFA==
QJymezEoLOFZ1T5EXus=
V8r5PAdwuGK2AUARohas
b1XV06ANH9s5uj5EXus=
3EiEhwo7Euw2tl8=
c2PjK8Izkydy5N8x
CXCkYf0m/qPrv8QajKyT6Oo=
pHjy+Mk0CqvWBXdCz8WoFA==
QjSwr3/j5rAyvz5EXus=
+edxANg/sU+k8YFQz8WoFA==
tWiQq3rqyl6cTAG9pA==
GeAyMQxBUOlDwD5EXus=
nQ5eoT2mEKkhDN2DwBek
JP5dIbHlrXXR8umDwBek
BMT8B9n1OyBvqL+WUSgsKv0=
RSeJYDyteizAdQbSCyHeYCCMZL1A
NOgCENlCLthl5TV9YsWpTzHAdjCmUw==
s2npDaPJBhAdm10=
TXr1YfxiKOkqcgfcHV092XmTHA==
aTXN1nHe/gVFvD5EXus=
TS+nK+9V4pW+9cko
GuBk6sExhxNLr7wYhPbZEtd/
oHWjdWHDv228J/jg0q6xYvzLcxRiMhI=
z6pB06UWdBZHuj5EXus=
nZ7gYT4zv3fY
gXHxw16/sjbOAABSuAnZEtd/
m2asNcPsiDe3I27NxByg2XmTHA==
leg4fQ1h3ZG+9cko
AmB4B64SvFJ6t1G2z8WoFA==
7agWYtMw0Wu2yptkrA==
yzl7iRI/QhdFiRV+eQXh2qsEinZosxo=
gcntJ8YrjSVy5N8x
hmi6U/JgAY/CyptkrA==
/2edLM81848QdjaiqyLu051h
57A/tEumUOZ3Nc6c3Q/aQx8Hiq38AvyPxw==
qI77ulvxShNayD5EXus=
IPA6VOUd6xAdm10=
6LAL4bkhuGHG5+WDwBek
06pAU/Af78kc13PYvx2l2XmTHA==
LhRuu47pEuACWUo=
98ue7uq/cVV9xQ==
Vxxkh13O3ZwXwlcqp5L/6OM=
XhYUTkQR6hAdm10=
RQE/ijRllTFI8umlUSgsKv0=
+2bIH8U2olR6PVYuAlnzaCaMZL1A
BMQ9MRDgCcoYGZlxF2gFHXp1
fmrbKPeT/LD1azf/CIEZLeKVCw==
ajSLMtRD25W+9cko
8LTyD9cHcVV9xQ==
mFi1hCWOhw5Huj5EXus=
FXSUHb8h45vFyptkrA==
lWmcMf1mwF2BLzwh/FncUzfPgHZosxo=
guwbCaTRfBKGAXWKUHUf+e90detZ
QhxpJrXlmzdKeRDrnCjfixcSwulI
Thag+Y/veDtRAOqDwBek
Z0Wp7pLMCBAdm10=
bT9HyWnOXhWYztVF4moy2XmTHA==
kXbZHKvU/Iq+9cko
richardcrebeck.com
Extracted
xloader
2.9
fofg
FHyydxpFBs0S8b4ZlP7ZEtd/
EVaCEKb/cVV9xQ==
U9I5lke0IuU7vj5EXus=
rXD3AKPV3qUblOUsV41KMfU=
PwBSy5z56XNzIvnS3ygsKv0=
CQe1BLbSnGXX
HuhKjxhLhxqBy2FFz8WoFA==
QJymezEoLOFZ1T5EXus=
V8r5PAdwuGK2AUARohas
b1XV06ANH9s5uj5EXus=
3EiEhwo7Euw2tl8=
c2PjK8Izkydy5N8x
CXCkYf0m/qPrv8QajKyT6Oo=
pHjy+Mk0CqvWBXdCz8WoFA==
QjSwr3/j5rAyvz5EXus=
+edxANg/sU+k8YFQz8WoFA==
tWiQq3rqyl6cTAG9pA==
GeAyMQxBUOlDwD5EXus=
nQ5eoT2mEKkhDN2DwBek
JP5dIbHlrXXR8umDwBek
BMT8B9n1OyBvqL+WUSgsKv0=
RSeJYDyteizAdQbSCyHeYCCMZL1A
NOgCENlCLthl5TV9YsWpTzHAdjCmUw==
s2npDaPJBhAdm10=
TXr1YfxiKOkqcgfcHV092XmTHA==
aTXN1nHe/gVFvD5EXus=
TS+nK+9V4pW+9cko
GuBk6sExhxNLr7wYhPbZEtd/
oHWjdWHDv228J/jg0q6xYvzLcxRiMhI=
z6pB06UWdBZHuj5EXus=
nZ7gYT4zv3fY
gXHxw16/sjbOAABSuAnZEtd/
m2asNcPsiDe3I27NxByg2XmTHA==
leg4fQ1h3ZG+9cko
AmB4B64SvFJ6t1G2z8WoFA==
7agWYtMw0Wu2yptkrA==
yzl7iRI/QhdFiRV+eQXh2qsEinZosxo=
gcntJ8YrjSVy5N8x
hmi6U/JgAY/CyptkrA==
/2edLM81848QdjaiqyLu051h
57A/tEumUOZ3Nc6c3Q/aQx8Hiq38AvyPxw==
qI77ulvxShNayD5EXus=
IPA6VOUd6xAdm10=
6LAL4bkhuGHG5+WDwBek
06pAU/Af78kc13PYvx2l2XmTHA==
LhRuu47pEuACWUo=
98ue7uq/cVV9xQ==
Vxxkh13O3ZwXwlcqp5L/6OM=
XhYUTkQR6hAdm10=
RQE/ijRllTFI8umlUSgsKv0=
+2bIH8U2olR6PVYuAlnzaCaMZL1A
BMQ9MRDgCcoYGZlxF2gFHXp1
fmrbKPeT/LD1azf/CIEZLeKVCw==
ajSLMtRD25W+9cko
8LTyD9cHcVV9xQ==
mFi1hCWOhw5Huj5EXus=
FXSUHb8h45vFyptkrA==
lWmcMf1mwF2BLzwh/FncUzfPgHZosxo=
guwbCaTRfBKGAXWKUHUf+e90detZ
QhxpJrXlmzdKeRDrnCjfixcSwulI
Thag+Y/veDtRAOqDwBek
Z0Wp7pLMCBAdm10=
bT9HyWnOXhWYztVF4moy2XmTHA==
kXbZHKvU/Iq+9cko
richardcrebeck.com
Signatures
-
Formbook family
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2268-13-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/2268-18-0x0000000000400000-0x000000000042C000-memory.dmp xloader behavioral2/memory/2168-24-0x00000000003C0000-0x00000000003EC000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\International\Geo\Nation List of gchain fall hoist needed for quotes pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1720 set thread context of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 2268 set thread context of 3512 2268 List of gchain fall hoist needed for quotes pdf.exe 56 PID 2168 set thread context of 3512 2168 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language List of gchain fall hoist needed for quotes pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 1720 List of gchain fall hoist needed for quotes pdf.exe 1720 List of gchain fall hoist needed for quotes pdf.exe 1720 List of gchain fall hoist needed for quotes pdf.exe 1720 List of gchain fall hoist needed for quotes pdf.exe 1720 List of gchain fall hoist needed for quotes pdf.exe 1720 List of gchain fall hoist needed for quotes pdf.exe 2268 List of gchain fall hoist needed for quotes pdf.exe 2268 List of gchain fall hoist needed for quotes pdf.exe 2268 List of gchain fall hoist needed for quotes pdf.exe 2268 List of gchain fall hoist needed for quotes pdf.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe 2168 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2268 List of gchain fall hoist needed for quotes pdf.exe 2268 List of gchain fall hoist needed for quotes pdf.exe 2268 List of gchain fall hoist needed for quotes pdf.exe 2168 wlanext.exe 2168 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1720 List of gchain fall hoist needed for quotes pdf.exe Token: SeDebugPrivilege 2268 List of gchain fall hoist needed for quotes pdf.exe Token: SeDebugPrivilege 2168 wlanext.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1720 wrote to memory of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 1720 wrote to memory of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 1720 wrote to memory of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 1720 wrote to memory of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 1720 wrote to memory of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 1720 wrote to memory of 2268 1720 List of gchain fall hoist needed for quotes pdf.exe 99 PID 3512 wrote to memory of 2168 3512 Explorer.EXE 100 PID 3512 wrote to memory of 2168 3512 Explorer.EXE 100 PID 3512 wrote to memory of 2168 3512 Explorer.EXE 100 PID 2168 wrote to memory of 1660 2168 wlanext.exe 101 PID 2168 wrote to memory of 1660 2168 wlanext.exe 101 PID 2168 wrote to memory of 1660 2168 wlanext.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"3⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2268
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\List of gchain fall hoist needed for quotes pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1660
-
-