Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
24-11-2024 12:37
Static task
static1
Behavioral task
behavioral1
Sample
INVOICE_90990_PDF.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
INVOICE_90990_PDF.exe
Resource
win10v2004-20241007-en
General
-
Target
INVOICE_90990_PDF.exe
-
Size
297KB
-
MD5
3e94bee073a286e8b446e87a126dde1e
-
SHA1
bf461d7bc78fd36eb06ca49e4e02c3bc06897905
-
SHA256
85951f6ce24ad0c5e5a73c26b48dca2c9e013b554639e46dbf02bffd56cf1891
-
SHA512
62f69bdcf76a8d03be76fbc3f9e92690dac88b5bcebb127b0ccf1c5fee63d7c3a22bcf49810ae7294aa2828618e0403a7cc5e61e5b6b492f3704b9e2b456e2a1
-
SSDEEP
6144:K88JIphcJQgx6nTM0qnI9SIBxbJUvGlTcVvwKEEtWm4O2e1:j8JvJQ7Q3ISwxbJSGlTmEky+
Malware Config
Extracted
xloader
2.3
usvr
theblockmeatstore.com
drone-moment.com
srsfashionbd.com
kylayagerartwork.com
instagrams.tools
rosenwealth.com
indicraftsvilla.com
rswizard.com
irist.one
pubgclaimx14.com
thegeorgiahomefinder.com
unusualdog.com
kifayatikart.com
methodunit.net
bavarian-luxury.com
17391000.com
ipcsaveday.com
yael-b.com
pasionqueconecta.com
youngsvideography.com
absorbscratch.icu
nzrugbylife.info
inabellesolutions.com
applesoso.com
soshop365.com
viewmydiary.com
onemillionrosary.com
erotickykontakt.com
xn--yfr994dchc.net
quiltedpicturebooks.com
monteiromarquesadv.com
anugrahdayakencana.com
jz-fh.com
beijingjiadu.com
qdwentang.com
shandasden.com
xn--bckb2ercf4fxgsa3e.xyz
ecozoca.com
spiritsvest.com
pigsflycheap.com
onenationunderbread.com
bunganutlakecampingarea.com
deltafinancialgroup.net
glamsocialevents.com
sportzdestinations.com
memento-lagoon.com
nuvo-condos.com
urteiki.com
negociosconjuanceri.com
finescocms.com
simposiocpa.com
topelk.com
duetoboias.com
priormakers.net
impossibilitee.com
zombiguitar.com
conseilaffaires.com
ecrires.xyz
magetu.info
miracle-tone.com
quranvisor.com
thebabytemplate.com
wcarrillo.com
wallstmotorsports.com
microprojects.net
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2772-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2772-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/988-13-0x0000000000070000-0x0000000000098000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2408 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2672 set thread context of 2772 2672 INVOICE_90990_PDF.exe 31 PID 2772 set thread context of 1180 2772 INVOICE_90990_PDF.exe 21 PID 988 set thread context of 1180 988 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language INVOICE_90990_PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2772 INVOICE_90990_PDF.exe 2772 INVOICE_90990_PDF.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe 988 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2672 INVOICE_90990_PDF.exe 2772 INVOICE_90990_PDF.exe 2772 INVOICE_90990_PDF.exe 2772 INVOICE_90990_PDF.exe 988 wscript.exe 988 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2772 INVOICE_90990_PDF.exe Token: SeDebugPrivilege 988 wscript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2772 2672 INVOICE_90990_PDF.exe 31 PID 2672 wrote to memory of 2772 2672 INVOICE_90990_PDF.exe 31 PID 2672 wrote to memory of 2772 2672 INVOICE_90990_PDF.exe 31 PID 2672 wrote to memory of 2772 2672 INVOICE_90990_PDF.exe 31 PID 2672 wrote to memory of 2772 2672 INVOICE_90990_PDF.exe 31 PID 1180 wrote to memory of 988 1180 Explorer.EXE 32 PID 1180 wrote to memory of 988 1180 Explorer.EXE 32 PID 1180 wrote to memory of 988 1180 Explorer.EXE 32 PID 1180 wrote to memory of 988 1180 Explorer.EXE 32 PID 988 wrote to memory of 2408 988 wscript.exe 33 PID 988 wrote to memory of 2408 988 wscript.exe 33 PID 988 wrote to memory of 2408 988 wscript.exe 33 PID 988 wrote to memory of 2408 988 wscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\INVOICE_90990_PDF.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE_90990_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\INVOICE_90990_PDF.exe"C:\Users\Admin\AppData\Local\Temp\INVOICE_90990_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2772
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:988 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\INVOICE_90990_PDF.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2408
-
-