Analysis
-
max time kernel
147s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
Fatura_Um0slpC3IsVAmnv.exe
Resource
win7-20240729-en
General
-
Target
Fatura_Um0slpC3IsVAmnv.exe
-
Size
594KB
-
MD5
e192091f95cde41724533037eee016f1
-
SHA1
3e31af5c3dacf364505ce50c1bc59f14efad372b
-
SHA256
00c31ece69362a5cccc665bc1d57b48240d5bf53cbb159cb72b26454849e798e
-
SHA512
ee46f4aa86e0594d9432ba3dc505b6faaddecfd37ae8219b5e69e10971874c0636358fd780580f3aa80a8cf38f645efe47ee96a83f3672fff41a1fbedfb59df6
-
SSDEEP
12288:bdSPwG60J+z7X++4567hYUDK4H9JW774ysGbBS3f:5lG6t74o9Ykd87Vb+f
Malware Config
Extracted
xloader
2.1
agwz
organicsifa.com
microlivros.com
kharestudio.com
processautomationsystem.com
359192.com
user-id06783.com
hoopletesonline.com
camrashos.com
xfgyzzm.icu
jjjllcbooking.com
ztouh.info
mynetlfis.info
honeydigi.com
claytelier.com
hbozoom.com
theleftreports.net
drmenelaou.com
ignoringracism.com
querofalardesaude.com
smithysminicharters.com
leadate.com
richjude.com
lasdeliciosasmx.com
dynamosdills.com
balconesdemercurio.com
buyiptv24.com
suhejia.com
harpoonchicken.com
kaymille.com
mxjingvv.icu
trybeagle.com
cranstonhill.com
sterlingplaceseniorliving.com
aserendipityfairytale.com
cartmedical.com
leggins-store.com
paydayloans10doqd.com
offerswap.online
buymoreofthese.com
bigjuicygoal.com
yoakemae.blue
slothzzz.com
fjuewyxhk.icu
thetexantech.com
liebaosouti.com
cphrealtyllc.com
viewpano.xyz
korean-ad.xyz
sarajdavis.com
bluehourdecisions.net
julienaltieri.com
summitcreators.com
microporebrush.com
cloudshopgr.com
replounge.com
fit-for-golf.com
umbroclub.com
grepreps.com
esrasuaklier.xyz
inacuastreaming.com
beastmodemoving.com
sunflourdelights.com
vaytiennhanhhn.com
binaxnowcovid19.com
chsepd.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral1/memory/2768-11-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2768-15-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1688 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1792 set thread context of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 2768 set thread context of 1196 2768 Fatura_Um0slpC3IsVAmnv.exe 21 PID 3068 set thread context of 1196 3068 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fatura_Um0slpC3IsVAmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
pid Process 1792 Fatura_Um0slpC3IsVAmnv.exe 1792 Fatura_Um0slpC3IsVAmnv.exe 1792 Fatura_Um0slpC3IsVAmnv.exe 2768 Fatura_Um0slpC3IsVAmnv.exe 2768 Fatura_Um0slpC3IsVAmnv.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe 3068 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2768 Fatura_Um0slpC3IsVAmnv.exe 2768 Fatura_Um0slpC3IsVAmnv.exe 2768 Fatura_Um0slpC3IsVAmnv.exe 3068 wscript.exe 3068 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1792 Fatura_Um0slpC3IsVAmnv.exe Token: SeDebugPrivilege 2768 Fatura_Um0slpC3IsVAmnv.exe Token: SeDebugPrivilege 3068 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1792 wrote to memory of 2768 1792 Fatura_Um0slpC3IsVAmnv.exe 30 PID 1196 wrote to memory of 3068 1196 Explorer.EXE 31 PID 1196 wrote to memory of 3068 1196 Explorer.EXE 31 PID 1196 wrote to memory of 3068 1196 Explorer.EXE 31 PID 1196 wrote to memory of 3068 1196 Explorer.EXE 31 PID 3068 wrote to memory of 1688 3068 wscript.exe 32 PID 3068 wrote to memory of 1688 3068 wscript.exe 32 PID 3068 wrote to memory of 1688 3068 wscript.exe 32 PID 3068 wrote to memory of 1688 3068 wscript.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1688
-
-