Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
02-12-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE_ORDER_00987_PDF.exe
Resource
win7-20240903-en
General
-
Target
PURCHASE_ORDER_00987_PDF.exe
-
Size
430KB
-
MD5
ac6706073f054030b05b71bdf23afc11
-
SHA1
dd90b7dea8bf16002b7bcef6f358b4eaefac62a6
-
SHA256
70e7c5966ac86d48e0519f9b2b34703d2915b603836f4de0be2a2badddd258e7
-
SHA512
dd86dfa395eb5930d7ba1f41f0d95d659b04b619c8b40e4903c3c04f9f6b09d160fd7da4c86a1cca8d9eca6a55cd5cb86c200967fd2d9ec68cb13475a0f463da
-
SSDEEP
12288:f12LO9X78MZ57vZ7NmeeKjVrqZiEOiewVrIdtBm8fO6:f12Lm7FEee6FsiuewQtg8fO6
Malware Config
Extracted
xloader
2.3
snaa
ivetau.com
jupstudios.com
myvintagespecs.com
nineliveslabs.xyz
linahaljarad.com
itbling.com
bqmmw.com
danmgg.com
savalanxe.com
gasolinestation.info
blankedu.com
virginiacannabislawyer.com
jochichicago.com
herbwarts.com
bigcitygigs.com
gheeduvine.com
underwoodway.net
philosophia-perennis.club
milanodesk.com
myrandr.com
thecta.info
web604.com
upcycledsqueakytoys.com
dropofwaterarts.com
montaukestudi.com
earnfreecash.online
racevc.com
yiqigoulll.com
wowo-199.com
greenev-design.com
25jacksonavenue.com
childrensdisabilities.com
indianmaidcompany.com
arthurreardon.com
littlefingersstudios.com
aprilsshowcase.info
yonker-yaoji.com
hnbainianluwei.com
thelashbarco.com
usopen-tennis-live.com
medallionsmargarita.com
dgy-hec.com
worldtv243.xyz
trumprepublicanpatriot.com
aetechnicalservice.com
cirradiamonds.com
detail72-paypal.com
nagadesh.com
overheiddienst.icu
waterfiltration.systems
axabzerezi.net
nanxishansong.com
onpassivewithpurpose.com
glassvows.com
onelivenews.com
almarkatescil.com
wikidhemp.com
xilorlando.com
storybooktoday.com
electricvisionneon.com
brownguyssitcom.com
connectsastasundar.com
darrensvisuals.com
hawklawyers.com
xeotochevrolet.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2576-3-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2576-6-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2876-12-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2564 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2556 set thread context of 2576 2556 PURCHASE_ORDER_00987_PDF.exe 31 PID 2576 set thread context of 1188 2576 PURCHASE_ORDER_00987_PDF.exe 21 PID 2876 set thread context of 1188 2876 cmd.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PURCHASE_ORDER_00987_PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2576 PURCHASE_ORDER_00987_PDF.exe 2576 PURCHASE_ORDER_00987_PDF.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe 2876 cmd.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2556 PURCHASE_ORDER_00987_PDF.exe 2576 PURCHASE_ORDER_00987_PDF.exe 2576 PURCHASE_ORDER_00987_PDF.exe 2576 PURCHASE_ORDER_00987_PDF.exe 2876 cmd.exe 2876 cmd.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2576 PURCHASE_ORDER_00987_PDF.exe Token: SeDebugPrivilege 2876 cmd.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2556 wrote to memory of 2576 2556 PURCHASE_ORDER_00987_PDF.exe 31 PID 2556 wrote to memory of 2576 2556 PURCHASE_ORDER_00987_PDF.exe 31 PID 2556 wrote to memory of 2576 2556 PURCHASE_ORDER_00987_PDF.exe 31 PID 2556 wrote to memory of 2576 2556 PURCHASE_ORDER_00987_PDF.exe 31 PID 2556 wrote to memory of 2576 2556 PURCHASE_ORDER_00987_PDF.exe 31 PID 1188 wrote to memory of 2876 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2876 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2876 1188 Explorer.EXE 32 PID 1188 wrote to memory of 2876 1188 Explorer.EXE 32 PID 2876 wrote to memory of 2564 2876 cmd.exe 33 PID 2876 wrote to memory of 2564 2876 cmd.exe 33 PID 2876 wrote to memory of 2564 2876 cmd.exe 33 PID 2876 wrote to memory of 2564 2876 cmd.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2576
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\SysWOW64\cmd.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2564
-
-