Analysis
-
max time kernel
148s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
30-12-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
Craig_Group_Quotation,pdf.exe
Resource
win7-20241010-en
General
-
Target
Craig_Group_Quotation,pdf.exe
-
Size
1.1MB
-
MD5
a885699fd3e6da80b574541565df717e
-
SHA1
fa98d786dd5ec70400573dde7301ac6c6eb8e720
-
SHA256
7541f828539e1c7ddccbb3c581886958b16c8016675ac2fb2dd9998bd1dc1161
-
SHA512
9711111833a07fe9f4366b928ce3c1cd9d7eee270129972a0260864432214c931c7356bcb0d874701407f812b0a64e0254f4a74d96ac4900e3f971156989b83d
-
SSDEEP
24576:QTOxcq/gHU5/d3dK64J5IHuH4oJiA+wneFl4MxgalS:QTOxpK64JyOYoEX4MOX
Malware Config
Extracted
xloader
2.3
rqe8
bjft.net
abrosnm3.com
badlistens.com
signal-japan.com
schaka.com
kingdompersonalbranding.com
sewmenship.com
lzproperty.com
mojoimpacthosting.com
carinsurancecoverage.care
corporatemercadona.com
mobileswash.com
forevercelebration2026.com
co-het.com
bellesherlou.com
commentsoldgolf.com
onlytwod.group
utesco.info
martstrip.com
onszdgu.icu
progress-ai.com
flood-pictures.com
theyerpa.com
roicjhy.icu
have-boyscout-yg.com
neosimplerack.com
foofloin.com
nielsentrust.com
digitalwt.com
astaxanthinsaveme.com
hashseries.com
asesoriasyh.com
sun5new.com
domain-here.com
joshuasklarvoices.com
thecoregr.com
dreamstatebedding.com
archostekton.com
10612crestondr.com
wallfeez.com
azamdairy.com
allied-products.com
jingxinlt.com
sometingwild.com
timhafun.net
meesowell.com
betteryou999.com
theslut.net
lifewithken.com
workhardrrhh.com
meatbeoff.com
influencerflywheel.com
qzzstz.com
toewsontherun.com
esperienzahotels.com
codemybm.com
medanchess.com
greenfeltfox.com
towinggodfreyil.net
gamersgangbd.com
move-views.com
spezialitat.com
dreammyteepe.com
sheltoncannabis.com
steveblexrud.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2116-3-0x0000000000390000-0x00000000003A2000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2896-14-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2896-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2820-24-0x0000000000070000-0x0000000000098000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2856 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2116 set thread context of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2896 set thread context of 1212 2896 Craig_Group_Quotation,pdf.exe 21 PID 2820 set thread context of 1212 2820 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Craig_Group_Quotation,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2896 Craig_Group_Quotation,pdf.exe 2896 Craig_Group_Quotation,pdf.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe 2820 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2896 Craig_Group_Quotation,pdf.exe 2896 Craig_Group_Quotation,pdf.exe 2896 Craig_Group_Quotation,pdf.exe 2820 wscript.exe 2820 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2896 Craig_Group_Quotation,pdf.exe Token: SeDebugPrivilege 2820 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 2116 wrote to memory of 2896 2116 Craig_Group_Quotation,pdf.exe 30 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 31 PID 1212 wrote to memory of 2820 1212 Explorer.EXE 31 PID 2820 wrote to memory of 2856 2820 wscript.exe 32 PID 2820 wrote to memory of 2856 2820 wscript.exe 32 PID 2820 wrote to memory of 2856 2820 wscript.exe 32 PID 2820 wrote to memory of 2856 2820 wscript.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2896
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2856
-
-