Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
23-12-2024 18:58
Static task
static1
Behavioral task
behavioral1
Sample
Fatura_Um0slpC3IsVAmnv.exe
Resource
win7-20240729-en
General
-
Target
Fatura_Um0slpC3IsVAmnv.exe
-
Size
594KB
-
MD5
e192091f95cde41724533037eee016f1
-
SHA1
3e31af5c3dacf364505ce50c1bc59f14efad372b
-
SHA256
00c31ece69362a5cccc665bc1d57b48240d5bf53cbb159cb72b26454849e798e
-
SHA512
ee46f4aa86e0594d9432ba3dc505b6faaddecfd37ae8219b5e69e10971874c0636358fd780580f3aa80a8cf38f645efe47ee96a83f3672fff41a1fbedfb59df6
-
SSDEEP
12288:bdSPwG60J+z7X++4567hYUDK4H9JW774ysGbBS3f:5lG6t74o9Ykd87Vb+f
Malware Config
Extracted
xloader
2.1
agwz
organicsifa.com
microlivros.com
kharestudio.com
processautomationsystem.com
359192.com
user-id06783.com
hoopletesonline.com
camrashos.com
xfgyzzm.icu
jjjllcbooking.com
ztouh.info
mynetlfis.info
honeydigi.com
claytelier.com
hbozoom.com
theleftreports.net
drmenelaou.com
ignoringracism.com
querofalardesaude.com
smithysminicharters.com
leadate.com
richjude.com
lasdeliciosasmx.com
dynamosdills.com
balconesdemercurio.com
buyiptv24.com
suhejia.com
harpoonchicken.com
kaymille.com
mxjingvv.icu
trybeagle.com
cranstonhill.com
sterlingplaceseniorliving.com
aserendipityfairytale.com
cartmedical.com
leggins-store.com
paydayloans10doqd.com
offerswap.online
buymoreofthese.com
bigjuicygoal.com
yoakemae.blue
slothzzz.com
fjuewyxhk.icu
thetexantech.com
liebaosouti.com
cphrealtyllc.com
viewpano.xyz
korean-ad.xyz
sarajdavis.com
bluehourdecisions.net
julienaltieri.com
summitcreators.com
microporebrush.com
cloudshopgr.com
replounge.com
fit-for-golf.com
umbroclub.com
grepreps.com
esrasuaklier.xyz
inacuastreaming.com
beastmodemoving.com
sunflourdelights.com
vaytiennhanhhn.com
binaxnowcovid19.com
chsepd.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/716-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/716-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 720 set thread context of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 716 set thread context of 3532 716 Fatura_Um0slpC3IsVAmnv.exe 56 PID 3368 set thread context of 3532 3368 msdt.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Fatura_Um0slpC3IsVAmnv.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 49 IoCs
pid Process 720 Fatura_Um0slpC3IsVAmnv.exe 720 Fatura_Um0slpC3IsVAmnv.exe 720 Fatura_Um0slpC3IsVAmnv.exe 716 Fatura_Um0slpC3IsVAmnv.exe 716 Fatura_Um0slpC3IsVAmnv.exe 716 Fatura_Um0slpC3IsVAmnv.exe 716 Fatura_Um0slpC3IsVAmnv.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe 3368 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 716 Fatura_Um0slpC3IsVAmnv.exe 716 Fatura_Um0slpC3IsVAmnv.exe 716 Fatura_Um0slpC3IsVAmnv.exe 3368 msdt.exe 3368 msdt.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 720 Fatura_Um0slpC3IsVAmnv.exe Token: SeDebugPrivilege 716 Fatura_Um0slpC3IsVAmnv.exe Token: SeDebugPrivilege 3368 msdt.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 720 wrote to memory of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 720 wrote to memory of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 720 wrote to memory of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 720 wrote to memory of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 720 wrote to memory of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 720 wrote to memory of 716 720 Fatura_Um0slpC3IsVAmnv.exe 100 PID 3532 wrote to memory of 3368 3532 Explorer.EXE 101 PID 3532 wrote to memory of 3368 3532 Explorer.EXE 101 PID 3532 wrote to memory of 3368 3532 Explorer.EXE 101 PID 3368 wrote to memory of 1708 3368 msdt.exe 102 PID 3368 wrote to memory of 1708 3368 msdt.exe 102 PID 3368 wrote to memory of 1708 3368 msdt.exe 102
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3532 -
C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:716
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Fatura_Um0slpC3IsVAmnv.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1708
-
-