Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 01:53
Static task
static1
Behavioral task
behavioral1
Sample
PURCHASE_ORDER_00987_PDF.exe
Resource
win7-20240903-en
General
-
Target
PURCHASE_ORDER_00987_PDF.exe
-
Size
430KB
-
MD5
ac6706073f054030b05b71bdf23afc11
-
SHA1
dd90b7dea8bf16002b7bcef6f358b4eaefac62a6
-
SHA256
70e7c5966ac86d48e0519f9b2b34703d2915b603836f4de0be2a2badddd258e7
-
SHA512
dd86dfa395eb5930d7ba1f41f0d95d659b04b619c8b40e4903c3c04f9f6b09d160fd7da4c86a1cca8d9eca6a55cd5cb86c200967fd2d9ec68cb13475a0f463da
-
SSDEEP
12288:f12LO9X78MZ57vZ7NmeeKjVrqZiEOiewVrIdtBm8fO6:f12Lm7FEee6FsiuewQtg8fO6
Malware Config
Extracted
xloader
2.3
snaa
ivetau.com
jupstudios.com
myvintagespecs.com
nineliveslabs.xyz
linahaljarad.com
itbling.com
bqmmw.com
danmgg.com
savalanxe.com
gasolinestation.info
blankedu.com
virginiacannabislawyer.com
jochichicago.com
herbwarts.com
bigcitygigs.com
gheeduvine.com
underwoodway.net
philosophia-perennis.club
milanodesk.com
myrandr.com
thecta.info
web604.com
upcycledsqueakytoys.com
dropofwaterarts.com
montaukestudi.com
earnfreecash.online
racevc.com
yiqigoulll.com
wowo-199.com
greenev-design.com
25jacksonavenue.com
childrensdisabilities.com
indianmaidcompany.com
arthurreardon.com
littlefingersstudios.com
aprilsshowcase.info
yonker-yaoji.com
hnbainianluwei.com
thelashbarco.com
usopen-tennis-live.com
medallionsmargarita.com
dgy-hec.com
worldtv243.xyz
trumprepublicanpatriot.com
aetechnicalservice.com
cirradiamonds.com
detail72-paypal.com
nagadesh.com
overheiddienst.icu
waterfiltration.systems
axabzerezi.net
nanxishansong.com
onpassivewithpurpose.com
glassvows.com
onelivenews.com
almarkatescil.com
wikidhemp.com
xilorlando.com
storybooktoday.com
electricvisionneon.com
brownguyssitcom.com
connectsastasundar.com
darrensvisuals.com
hawklawyers.com
xeotochevrolet.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/4724-3-0x0000000000F70000-0x0000000000F98000-memory.dmp xloader behavioral2/memory/4724-7-0x0000000000F70000-0x0000000000F98000-memory.dmp xloader behavioral2/memory/4724-11-0x0000000000F70000-0x0000000000F98000-memory.dmp xloader behavioral2/memory/3756-17-0x0000000000640000-0x0000000000668000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3716 set thread context of 4724 3716 PURCHASE_ORDER_00987_PDF.exe 84 PID 4724 set thread context of 3512 4724 PURCHASE_ORDER_00987_PDF.exe 56 PID 4724 set thread context of 3512 4724 PURCHASE_ORDER_00987_PDF.exe 56 PID 3756 set thread context of 3512 3756 ipconfig.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language PURCHASE_ORDER_00987_PDF.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 3756 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe 3756 ipconfig.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3716 PURCHASE_ORDER_00987_PDF.exe 3716 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 4724 PURCHASE_ORDER_00987_PDF.exe 3756 ipconfig.exe 3756 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4724 PURCHASE_ORDER_00987_PDF.exe Token: SeDebugPrivilege 3756 ipconfig.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3716 wrote to memory of 4724 3716 PURCHASE_ORDER_00987_PDF.exe 84 PID 3716 wrote to memory of 4724 3716 PURCHASE_ORDER_00987_PDF.exe 84 PID 3716 wrote to memory of 4724 3716 PURCHASE_ORDER_00987_PDF.exe 84 PID 3716 wrote to memory of 4724 3716 PURCHASE_ORDER_00987_PDF.exe 84 PID 3512 wrote to memory of 3756 3512 Explorer.EXE 91 PID 3512 wrote to memory of 3756 3512 Explorer.EXE 91 PID 3512 wrote to memory of 3756 3512 Explorer.EXE 91 PID 3756 wrote to memory of 3052 3756 ipconfig.exe 94 PID 3756 wrote to memory of 3052 3756 ipconfig.exe 94 PID 3756 wrote to memory of 3052 3756 ipconfig.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3512 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4724
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3756 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\PURCHASE_ORDER_00987_PDF.exe"3⤵
- System Location Discovery: System Language Discovery
PID:3052
-
-