Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
样本目录 2020_pdf.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
样本目录 2020_pdf.exe
Resource
win10v2004-20241007-en
General
-
Target
样本目录 2020_pdf.exe
-
Size
245KB
-
MD5
d4a74696a8037005cdeb0afa11518a60
-
SHA1
cfedd27d891c0aa333f1cd65466527a59983b98a
-
SHA256
1b38b1f27ad4594b760fc65c0a898408dc9b586c90f97670c3a40d7dbe837795
-
SHA512
6284ae648ac8bfd8fbaae5ee1f24fc5c5ddad87f1ab6596a07487559d499bec338f3171a5eba70858e508916cefeee72a0a523bf3407cd95e414902b991181a0
-
SSDEEP
6144:kqKdjfLq5IGpXQgRdEypXmO5PZMFZ1fbnETB9ms5:lIGpXQgRdzmePZedbETl
Malware Config
Extracted
xloader
2.3
nu8e
joansmoviereviews.com
tronicsbuyer.com
test-amqatest-27-08-2020.com
localwebsurvey.email
toptierschools.com
exoticfilipina.com
iregentos.info
ic500500.com
z3255vsrwqstudio.club
dacabionline.com
innov-learners.com
redwardenstudios.com
payprscn.com
hannahmadeya.com
acandenizhukuk.com
alhaddarnewse.com
aestheticsbrazil.com
amandamcmahon.net
naughtykittyllc.com
germantoolbox.com
thelittlesunshinestore.com
successclickmg.com
lfmanyan.com
huzurmermer.net
megami-online.com
putrc.com
yourbackstagepasses.com
trinityhousegoa.com
gproweb.com
transformationretreat.com
positivemotion.art
busmanholiday.com
feerosedeco.com
cerritosphilosophy.club
shelter911.com
oxcontracting.com
talesontwowheels.com
sandbarbargrille.com
electrumtech.support
uaenrb.com
kictexpo.com
ofertascenturfit.com
tiantianhanju.com
coollivinghawaii.com
savitridevi.net
sekaimeshi.com
magicmindsetacademy.com
themoonbulb.com
amplifythecross.com
chuangyibianxian.com
chou18.com
kenoshariot.com
labraxpk.com
allurecbd.store
nde.bet
yjdave.com
judyflanaganart.com
amazonunion.com
gattisicecream.com
naturalselfheal.com
tol-con.com
jinanlanwo.com
hp516.com
findingyourbranch.com
firstbirthdayphotoshoot.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1768-3-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1768-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2260-14-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2732 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1476 set thread context of 1768 1476 样本目录 2020_pdf.exe 31 PID 1768 set thread context of 1184 1768 样本目录 2020_pdf.exe 21 PID 2260 set thread context of 1184 2260 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 样本目录 2020_pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 1768 样本目录 2020_pdf.exe 1768 样本目录 2020_pdf.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1476 样本目录 2020_pdf.exe 1768 样本目录 2020_pdf.exe 1768 样本目录 2020_pdf.exe 1768 样本目录 2020_pdf.exe 2260 rundll32.exe 2260 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1768 样本目录 2020_pdf.exe Token: SeDebugPrivilege 2260 rundll32.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1476 wrote to memory of 1768 1476 样本目录 2020_pdf.exe 31 PID 1476 wrote to memory of 1768 1476 样本目录 2020_pdf.exe 31 PID 1476 wrote to memory of 1768 1476 样本目录 2020_pdf.exe 31 PID 1476 wrote to memory of 1768 1476 样本目录 2020_pdf.exe 31 PID 1476 wrote to memory of 1768 1476 样本目录 2020_pdf.exe 31 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 1184 wrote to memory of 2260 1184 Explorer.EXE 32 PID 2260 wrote to memory of 2732 2260 rundll32.exe 33 PID 2260 wrote to memory of 2732 2260 rundll32.exe 33 PID 2260 wrote to memory of 2732 2260 rundll32.exe 33 PID 2260 wrote to memory of 2732 2260 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\样本目录 2020_pdf.exe"C:\Users\Admin\AppData\Local\Temp\样本目录 2020_pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\样本目录 2020_pdf.exe"C:\Users\Admin\AppData\Local\Temp\样本目录 2020_pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1768
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\样本目录 2020_pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2732
-
-