Analysis
-
max time kernel
150s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:47
Static task
static1
Behavioral task
behavioral1
Sample
PAYMENT.exe
Resource
win7-20241010-en
General
-
Target
PAYMENT.exe
-
Size
1.1MB
-
MD5
d639a70d7bb8cd136bc920a15ac2a5fa
-
SHA1
4ca0f11ba335654fe8d7dfab478202eb3d90e337
-
SHA256
d3e580c4794a5e5e50f2334e3ecba635ed049952c30be08f283a72e299f64f8b
-
SHA512
9a5c45f99c7e02a6965f413c3df9ca6408c24e0bfb934595199a04f899ce4bb02cfd3288b845cf20dc664476a889dc32c5f7571f07acdac93aca3308a157759e
-
SSDEEP
24576:/Fozo5ztlrUM4QgKtGoIay1vcrP0lPn1/0S+7n4SYtqChJ+hu3A8K/dwiGY1iQSQ:/wojljIKzIa+crceGP
Malware Config
Extracted
xloader
2.3
f4ut
studiokventura.com
rmnslashes.com
oklahomapropertybuyersllc.com
pmfce.net
yingkuncy.com
theailearning.com
artistic1cleaning.com
shqinyue.com
dentaldunya.com
karatuhotel.com
renttoownhomephoenix.com
0087wt.com
hotelsearchkwnet.com
dentavangart.com
98700l.com
seattleproducecompany.com
magicparadigm.com
cunix88.com
vr646.com
calmonleiloes.com
wuzhixuan.net
japhetsaysautomate.com
coolsday.com
17wsf.net
miami-dolphins.club
hypercars24.com
realdealryan.com
xboxscuf.com
thehawaiirealestateguy.com
upscalesociete.com
divyendujha.com
itapooloseoje.com
thesublimationsuperstore.com
artiflair.net
cunha.club
frichickspk.com
postworldwide.com
xn--vinkleskab-3cb.info
kimmchidesign.com
asapinclink.com
vidacsa.com
caspian24.com
nirvananailzplusnailsbymona.com
supng.com
seed.realty
grapheneventures.net
wondershareuniconverter.com
lngstorage.net
swiftsymphony.com
khgf.net
revendas.online
danisdiet.com
reenelectric.com
blacksheepmountaingourmet.com
mitrakemas.com
shadingconsultancy.com
walbrealtor.com
kantiemedicare.net
donatetomikepompeo.com
peiqifei.com
divinehoneybeauty.com
alruha.com
c2eat.com
cherylhuff.com
celebritymist.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/2740-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2740-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2740-22-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1820-29-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1832 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2296 set thread context of 2740 2296 PAYMENT.exe 30 PID 2740 set thread context of 1220 2740 PAYMENT.exe 21 PID 2740 set thread context of 1220 2740 PAYMENT.exe 21 PID 1820 set thread context of 1220 1820 netsh.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PAYMENT.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2740 PAYMENT.exe 2740 PAYMENT.exe 2740 PAYMENT.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe 1820 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2740 PAYMENT.exe 2740 PAYMENT.exe 2740 PAYMENT.exe 2740 PAYMENT.exe 1820 netsh.exe 1820 netsh.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2296 PAYMENT.exe Token: SeDebugPrivilege 2740 PAYMENT.exe Token: SeDebugPrivilege 1820 netsh.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 2296 wrote to memory of 2740 2296 PAYMENT.exe 30 PID 1220 wrote to memory of 1820 1220 Explorer.EXE 49 PID 1220 wrote to memory of 1820 1220 Explorer.EXE 49 PID 1220 wrote to memory of 1820 1220 Explorer.EXE 49 PID 1220 wrote to memory of 1820 1220 Explorer.EXE 49 PID 1820 wrote to memory of 1832 1820 netsh.exe 50 PID 1820 wrote to memory of 1832 1820 netsh.exe 50 PID 1820 wrote to memory of 1832 1820 netsh.exe 50 PID 1820 wrote to memory of 1832 1820 netsh.exe 50
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2296 -
C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1496
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:308
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1880
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1872
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:1692
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:824
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2660
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2916
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2764
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2932
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2956
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2944
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3052
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3068
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2056
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:880
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:3064
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2152
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1832
-
-