Analysis
-
max time kernel
147s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION REQUEST-77464563548764577.exe
Resource
win7-20241010-en
General
-
Target
QUOTATION REQUEST-77464563548764577.exe
-
Size
459KB
-
MD5
3897eb8a9102764a1505ea62f1fd99b1
-
SHA1
f55a20f3c3bcd5c47aaee6bee97ebc09a8465c0a
-
SHA256
d00c073d20fa9d33eb8326798f0853be03a7f13e33bae3ce4c25c44bf25040f4
-
SHA512
e0ea30c4cbf71349c58fcc4d328545f7589da60cac4a205a21697be845f1c3e4d96befb0c82cbb82ce89e4261f279ceeacc014562ea828e6806e727b92e638fe
-
SSDEEP
12288:W+TT58a4TcM1h5j/UEyuumIKn0Fv6rRYgsHN:Wc34TcQTfyuNIKnJrR5
Malware Config
Extracted
xloader
2.5
s6ap
treika.com
xsacn.com
yokutoku.info
cao-catos.ca
summarizing-tool.net
owes.website
doortodelivery.com
minimixblocks.com
irinaorhideya.com
mayerohio.info
godofearth.love
byrdraffst.quest
cavalodomado.com
combatcollective.com
relianceroofsnashville.com
play-google-pokermatch.site
farhadhossain.us
remaxgreatplace.com
usati-consultec.com
improvizy.com
26gjm.xyz
dum-directory.xyz
senz.design
gpsmicro.com
xn--220bn5b396a.com
hostinghelp.guide
stumphouseprojects.com
portlife.net
fundamentalglobal.net
tdedicate.com
skillednft.com
nicholsenterprise.com
covid19voi.com
brocks33.com
studiozaja.com
peacemaker-recruit.com
sasson.quest
deleaderainfluenceur.com
carvik.com
rockymountainleather.com
quieromiscortinas.com
johnstonenterprise.com
pagotronic.net
tzdjs.com
oquendotrucking.com
sierwe.store
296351.com
kasbamooz.com
lonestarpickleballacademy.com
prichal-hotel.store
unitedtogether.club
1kaboomslots.info
shorelineeastbni.com
leodawn.com
526785.xyz
guterrabrokersystemcarriers.com
mobilesolutions.store
keitai-soudan.com
mzjing.com
clickcuracao.net
a1educationalstudy.com
cleanerguard.com
meizifang.xyz
solatopotato.com
onemindfulstep.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2856-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2856-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2856-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2348-27-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2632 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2208 set thread context of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2856 set thread context of 1240 2856 QUOTATION REQUEST-77464563548764577.exe 21 PID 2856 set thread context of 1240 2856 QUOTATION REQUEST-77464563548764577.exe 21 PID 2348 set thread context of 1240 2348 netsh.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION REQUEST-77464563548764577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION REQUEST-77464563548764577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2856 QUOTATION REQUEST-77464563548764577.exe 2856 QUOTATION REQUEST-77464563548764577.exe 2856 QUOTATION REQUEST-77464563548764577.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe 2348 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2856 QUOTATION REQUEST-77464563548764577.exe 2856 QUOTATION REQUEST-77464563548764577.exe 2856 QUOTATION REQUEST-77464563548764577.exe 2856 QUOTATION REQUEST-77464563548764577.exe 2348 netsh.exe 2348 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2856 QUOTATION REQUEST-77464563548764577.exe Token: SeDebugPrivilege 2348 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2208 wrote to memory of 2856 2208 QUOTATION REQUEST-77464563548764577.exe 30 PID 2856 wrote to memory of 2348 2856 QUOTATION REQUEST-77464563548764577.exe 31 PID 2856 wrote to memory of 2348 2856 QUOTATION REQUEST-77464563548764577.exe 31 PID 2856 wrote to memory of 2348 2856 QUOTATION REQUEST-77464563548764577.exe 31 PID 2856 wrote to memory of 2348 2856 QUOTATION REQUEST-77464563548764577.exe 31 PID 2348 wrote to memory of 2632 2348 netsh.exe 32 PID 2348 wrote to memory of 2632 2348 netsh.exe 32 PID 2348 wrote to memory of 2632 2348 netsh.exe 32 PID 2348 wrote to memory of 2632 2348 netsh.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1240
-
C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2632
-
-
-
-