Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-11-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
QUOTATION REQUEST-77464563548764577.exe
Resource
win7-20241010-en
General
-
Target
QUOTATION REQUEST-77464563548764577.exe
-
Size
459KB
-
MD5
3897eb8a9102764a1505ea62f1fd99b1
-
SHA1
f55a20f3c3bcd5c47aaee6bee97ebc09a8465c0a
-
SHA256
d00c073d20fa9d33eb8326798f0853be03a7f13e33bae3ce4c25c44bf25040f4
-
SHA512
e0ea30c4cbf71349c58fcc4d328545f7589da60cac4a205a21697be845f1c3e4d96befb0c82cbb82ce89e4261f279ceeacc014562ea828e6806e727b92e638fe
-
SSDEEP
12288:W+TT58a4TcM1h5j/UEyuumIKn0Fv6rRYgsHN:Wc34TcQTfyuNIKnJrR5
Malware Config
Extracted
xloader
2.5
s6ap
treika.com
xsacn.com
yokutoku.info
cao-catos.ca
summarizing-tool.net
owes.website
doortodelivery.com
minimixblocks.com
irinaorhideya.com
mayerohio.info
godofearth.love
byrdraffst.quest
cavalodomado.com
combatcollective.com
relianceroofsnashville.com
play-google-pokermatch.site
farhadhossain.us
remaxgreatplace.com
usati-consultec.com
improvizy.com
26gjm.xyz
dum-directory.xyz
senz.design
gpsmicro.com
xn--220bn5b396a.com
hostinghelp.guide
stumphouseprojects.com
portlife.net
fundamentalglobal.net
tdedicate.com
skillednft.com
nicholsenterprise.com
covid19voi.com
brocks33.com
studiozaja.com
peacemaker-recruit.com
sasson.quest
deleaderainfluenceur.com
carvik.com
rockymountainleather.com
quieromiscortinas.com
johnstonenterprise.com
pagotronic.net
tzdjs.com
oquendotrucking.com
sierwe.store
296351.com
kasbamooz.com
lonestarpickleballacademy.com
prichal-hotel.store
unitedtogether.club
1kaboomslots.info
shorelineeastbni.com
leodawn.com
526785.xyz
guterrabrokersystemcarriers.com
mobilesolutions.store
keitai-soudan.com
mzjing.com
clickcuracao.net
a1educationalstudy.com
cleanerguard.com
meizifang.xyz
solatopotato.com
onemindfulstep.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/2896-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2896-16-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2896-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2792-25-0x0000000000A10000-0x0000000000A39000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4264 set thread context of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 2896 set thread context of 3468 2896 QUOTATION REQUEST-77464563548764577.exe 56 PID 2896 set thread context of 3468 2896 QUOTATION REQUEST-77464563548764577.exe 56 PID 2792 set thread context of 3468 2792 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language QUOTATION REQUEST-77464563548764577.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2792 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 46 IoCs
pid Process 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE 2792 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2896 QUOTATION REQUEST-77464563548764577.exe 2792 NETSTAT.EXE 2792 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2896 QUOTATION REQUEST-77464563548764577.exe Token: SeDebugPrivilege 2792 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4264 wrote to memory of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 4264 wrote to memory of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 4264 wrote to memory of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 4264 wrote to memory of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 4264 wrote to memory of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 4264 wrote to memory of 2896 4264 QUOTATION REQUEST-77464563548764577.exe 93 PID 3468 wrote to memory of 2792 3468 Explorer.EXE 94 PID 3468 wrote to memory of 2792 3468 Explorer.EXE 94 PID 3468 wrote to memory of 2792 3468 Explorer.EXE 94 PID 2792 wrote to memory of 1604 2792 NETSTAT.EXE 95 PID 2792 wrote to memory of 1604 2792 NETSTAT.EXE 95 PID 2792 wrote to memory of 1604 2792 NETSTAT.EXE 95
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4264 -
C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\QUOTATION REQUEST-77464563548764577.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1604
-
-