Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
22-12-2024 06:00
Static task
static1
Behavioral task
behavioral1
Sample
Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe
Resource
win7-20241023-en
General
-
Target
Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe
-
Size
1.2MB
-
MD5
1e956cce584ed3910b0914ed03c5b396
-
SHA1
c8e5c8f09696b8d5c81ed979a5eba7066eba5305
-
SHA256
0c79a0b34b24ef2f69bb07586863afa5d3631398f79b895390ec2beddaa4fb78
-
SHA512
47196bae5faebcb994d690651d7ce91ae35482f24c42ebd290b681dd5f60dda421368c20bd849d81d5f8c6e882ef084d3ed5c3ed118d1f7133a23e3cd7e66b3f
-
SSDEEP
24576:J6QP6K2CngiZucOaCrYz4jEmW/g+xRri3Md+clMr+b1E43:tPb2CgcyrKmW/PHi3Hrqv
Malware Config
Extracted
xloader
2.1
eao
littletram.com
vanmetaal.com
clubbingspringbreak.com
intohuman.com
steph.place
ipsumksa.com
paultoon.com
wocwebowecbweogw.com
beverlyhillsmerch.com
vans-athens.com
stylishnailsbyem.com
milletvit.com
pappyjacksburgershack.com
anal-liza.com
lotownerbuilders.com
caffinatics.com
cvbtrading.co.uk
pheasanttrailsgolfcourse.com
wed0888.com
sundeepm.com
moneymakersclub.net
candcsaptai.com
skogsframjandet.com
rockstarpartyrentals.com
prostylezhairsalon.com
rogue.football
selfsufficientlearners.com
wisdom-consult.com
pivicric.info
domainemariage.com
mathsforstudents.com
wowdaebak.com
linbook8888.com
exceeidt.com
aicebit.com
ncgf61.com
argenteriamantova.com
hey-bamboo.com
elgritodeharpo.com
realbrosofles.com
5766557.com
galileomkt.com
astrugar.com
haasmyasupportagency.com
power-realestate.com
14201shastaway.com
solofsantabarbara.com
magentnew.com
xuedaiting.com
accokeektvmounting.com
ressindia.com
abuju.com
commcheapshop.com
indokaryasm.com
taddle.one
economicdevelopmentsoftware.com
fayk222.icu
4winner.xyz
undefinedheightsinc.com
sunfloe.com
xp135.com
simoncablehair.com
condor-protection.com
dentoviaoneday.com
touchtoby.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2768-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2768-17-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2768-21-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 4992 set thread context of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 2768 set thread context of 3540 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 56 PID 2768 set thread context of 3540 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 56 PID 4940 set thread context of 3540 4940 cmstp.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 48 IoCs
pid Process 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe 4940 cmstp.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 4940 cmstp.exe 4940 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe Token: SeDebugPrivilege 2768 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe Token: SeDebugPrivilege 4940 cmstp.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4992 wrote to memory of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 4992 wrote to memory of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 4992 wrote to memory of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 4992 wrote to memory of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 4992 wrote to memory of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 4992 wrote to memory of 2768 4992 Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe 100 PID 3540 wrote to memory of 4940 3540 Explorer.EXE 101 PID 3540 wrote to memory of 4940 3540 Explorer.EXE 101 PID 3540 wrote to memory of 4940 3540 Explorer.EXE 101 PID 4940 wrote to memory of 2228 4940 cmstp.exe 103 PID 4940 wrote to memory of 2228 4940 cmstp.exe 103 PID 4940 wrote to memory of 2228 4940 cmstp.exe 103
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3540 -
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Purchase order O4500016955EqgcN9Xz7YZKqZ2.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2228
-
-