Analysis
-
max time kernel
147s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24-12-2024 22:34
Static task
static1
Behavioral task
behavioral1
Sample
order payment.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
order payment.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
hgdwc.exe
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
hgdwc.exe
Resource
win10v2004-20241007-en
General
-
Target
order payment.exe
-
Size
291KB
-
MD5
ec2853c83cff7b763bb603a2754749f1
-
SHA1
0d7e640764aea9b1a8585ac57edf8e2061cd5c61
-
SHA256
9cb67c087ee707c5878f773e00cc4d55ad3b9fa3092b9ea9614647a06a9c9003
-
SHA512
e8f6521f398c1670f3efb5b34b52e58eb8f960a8496e81d5ea180ff763581fa7802ca1352a6ec5733d449f68e0a1918c8744fd8b824e9b15ad10086330e8ec5c
-
SSDEEP
6144:owkx9R0tcuke6acPbZv8f3tdSUmuzpJ40N/btqbJZCZquFHyqWUG:m9R1GuPN8/VdpJD5eZATHyMG
Malware Config
Extracted
xloader
2.5
voa9
hamedsoleimani.com
21t8.com
closurefroioj.xyz
1840beverlyglen308.com
zp1915213066.xyz
fesoftware.net
alamana.group
assetto.tech
vizitafrica.com
kalinganet.com
brzksmly.com
bipcursos.com
ketquaxskt.com
shemaworld.com
niftyyak.com
lockwoodtowncenter.com
carteiradetrafego.com
877561.com
handwrittenbooks.com
stribl.com
unlimitedsea.com
ultimatepavingllc.com
soccer-mun-acm.net
xn--fiqs8srv0ahj5a.xn--czru2d
nftforsex.com
designartistrystudios.com
thotlabz.com
kmzpr.com
1781tudor301.info
tucsonleaning.com
sethdavisworld.com
lovinglbuy.com
yamate-inn.com
revisepod.com
hosthike.com
seal-brother.com
cochesusadosarweb.com
cajusnusa.com
gogoma3.com
ramansellscolorado.com
aleandaustin.com
jamescnelson.com
cdbydx.xyz
damaccavallitower.com
stgrantproperties.com
spidervegas-casino.com
aoliumenuni.com
thesettlersthemovie.com
916351.com
luulyy.com
sudanglobalschool.com
fertilityexpertforum2021.com
solutioengenharia.com
zhangzhenfei.net
lomtalanit.com
mogyog.com
solster.tech
ndg-engineering.com
aberturasdediez.com
neogy.company
servicestaffapparel.com
heyink-on.com
winlanddepot.xyz
r2bhw.com
agrigain-soil.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/1236-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1236-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2096-22-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Executes dropped EXE 2 IoCs
pid Process 1908 hgdwc.exe 1236 hgdwc.exe -
Loads dropped DLL 2 IoCs
pid Process 1540 order payment.exe 1908 hgdwc.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1908 set thread context of 1236 1908 hgdwc.exe 31 PID 1236 set thread context of 1220 1236 hgdwc.exe 21 PID 2096 set thread context of 1220 2096 ipconfig.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language order payment.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hgdwc.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2096 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1236 hgdwc.exe 1236 hgdwc.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe 2096 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1236 hgdwc.exe 1236 hgdwc.exe 1236 hgdwc.exe 2096 ipconfig.exe 2096 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1236 hgdwc.exe Token: SeDebugPrivilege 2096 ipconfig.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1540 wrote to memory of 1908 1540 order payment.exe 30 PID 1540 wrote to memory of 1908 1540 order payment.exe 30 PID 1540 wrote to memory of 1908 1540 order payment.exe 30 PID 1540 wrote to memory of 1908 1540 order payment.exe 30 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1908 wrote to memory of 1236 1908 hgdwc.exe 31 PID 1220 wrote to memory of 2096 1220 Explorer.EXE 33 PID 1220 wrote to memory of 2096 1220 Explorer.EXE 33 PID 1220 wrote to memory of 2096 1220 Explorer.EXE 33 PID 1220 wrote to memory of 2096 1220 Explorer.EXE 33 PID 2096 wrote to memory of 2412 2096 ipconfig.exe 34 PID 2096 wrote to memory of 2412 2096 ipconfig.exe 34 PID 2096 wrote to memory of 2412 2096 ipconfig.exe 34 PID 2096 wrote to memory of 2412 2096 ipconfig.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\order payment.exe"C:\Users\Admin\AppData\Local\Temp\order payment.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\hgdwc.exeC:\Users\Admin\AppData\Local\Temp\hgdwc.exe C:\Users\Admin\AppData\Local\Temp\iukir3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\hgdwc.exeC:\Users\Admin\AppData\Local\Temp\hgdwc.exe C:\Users\Admin\AppData\Local\Temp\iukir4⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2632
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\hgdwc.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5b601f33851f78660a0b5abc2be3e83bb
SHA1c5fdb470e113470381935e9c2c10051aefb76970
SHA2561b69e05ac65da2ee1ba67be6aa16cff03cf880962630932e8523ff82cd71370b
SHA51282ff6b2355814f7b7a132b87f18bafec6b7d0c5f4b8b55eed13bee55c92069ea257f72305999fdfddd0620980850cf2dbc82d34bd6c5b3d3118aa3e008b08971
-
Filesize
4KB
MD55cd6eb17496e11cfe215c6e123bc2091
SHA1f4f8d3dd2668eb41cf435f8728f05e1771aac559
SHA2560599672c94c4632563c14238136c245df9b7166afabee2a64786835e09a67ad7
SHA512923cf8962aa052cc503df2ceeb18cec6f4fc29f26347146e5c0f8317ddf71f5e56724668bfe2840051433a3b83094839449a9af90dc375b23d7f46307b28d8bc
-
Filesize
120KB
MD5b1179c8714525c79f49b3e1cdbb37339
SHA17cae6fbe83da4a0a0cd4f090e731d50c7622aa05
SHA256dbff6c480833bf385c392057177822a2b6c7cc988ec6305c021aacf3e89c0f94
SHA512e23b43787e81f758e2758febe49c89680dbda8373acf3301b0092339f537c734425724bf13c7f210e8b76541cee68a544f8f8bc8682d24e138fd59815d0774a1