Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2024 23:36
Static task
static1
Behavioral task
behavioral1
Sample
Craig_Group_Quotation,pdf.exe
Resource
win7-20241010-en
General
-
Target
Craig_Group_Quotation,pdf.exe
-
Size
1.1MB
-
MD5
a885699fd3e6da80b574541565df717e
-
SHA1
fa98d786dd5ec70400573dde7301ac6c6eb8e720
-
SHA256
7541f828539e1c7ddccbb3c581886958b16c8016675ac2fb2dd9998bd1dc1161
-
SHA512
9711111833a07fe9f4366b928ce3c1cd9d7eee270129972a0260864432214c931c7356bcb0d874701407f812b0a64e0254f4a74d96ac4900e3f971156989b83d
-
SSDEEP
24576:QTOxcq/gHU5/d3dK64J5IHuH4oJiA+wneFl4MxgalS:QTOxpK64JyOYoEX4MOX
Malware Config
Extracted
xloader
2.3
rqe8
bjft.net
abrosnm3.com
badlistens.com
signal-japan.com
schaka.com
kingdompersonalbranding.com
sewmenship.com
lzproperty.com
mojoimpacthosting.com
carinsurancecoverage.care
corporatemercadona.com
mobileswash.com
forevercelebration2026.com
co-het.com
bellesherlou.com
commentsoldgolf.com
onlytwod.group
utesco.info
martstrip.com
onszdgu.icu
progress-ai.com
flood-pictures.com
theyerpa.com
roicjhy.icu
have-boyscout-yg.com
neosimplerack.com
foofloin.com
nielsentrust.com
digitalwt.com
astaxanthinsaveme.com
hashseries.com
asesoriasyh.com
sun5new.com
domain-here.com
joshuasklarvoices.com
thecoregr.com
dreamstatebedding.com
archostekton.com
10612crestondr.com
wallfeez.com
azamdairy.com
allied-products.com
jingxinlt.com
sometingwild.com
timhafun.net
meesowell.com
betteryou999.com
theslut.net
lifewithken.com
workhardrrhh.com
meatbeoff.com
influencerflywheel.com
qzzstz.com
toewsontherun.com
esperienzahotels.com
codemybm.com
medanchess.com
greenfeltfox.com
towinggodfreyil.net
gamersgangbd.com
move-views.com
spezialitat.com
dreammyteepe.com
sheltoncannabis.com
steveblexrud.com
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/3780-8-0x0000000005B60000-0x0000000005B72000-memory.dmp CustAttr -
Xloader payload 4 IoCs
resource yara_rule behavioral2/memory/1092-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1092-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1092-22-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4300-28-0x0000000000990000-0x00000000009B8000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3780 set thread context of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 1092 set thread context of 3604 1092 Craig_Group_Quotation,pdf.exe 56 PID 1092 set thread context of 3604 1092 Craig_Group_Quotation,pdf.exe 56 PID 4300 set thread context of 3604 4300 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Craig_Group_Quotation,pdf.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
pid Process 3780 Craig_Group_Quotation,pdf.exe 3780 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe 4300 wscript.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 1092 Craig_Group_Quotation,pdf.exe 4300 wscript.exe 4300 wscript.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3780 Craig_Group_Quotation,pdf.exe Token: SeDebugPrivilege 1092 Craig_Group_Quotation,pdf.exe Token: SeDebugPrivilege 4300 wscript.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3780 wrote to memory of 3800 3780 Craig_Group_Quotation,pdf.exe 91 PID 3780 wrote to memory of 3800 3780 Craig_Group_Quotation,pdf.exe 91 PID 3780 wrote to memory of 3800 3780 Craig_Group_Quotation,pdf.exe 91 PID 3780 wrote to memory of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 3780 wrote to memory of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 3780 wrote to memory of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 3780 wrote to memory of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 3780 wrote to memory of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 3780 wrote to memory of 1092 3780 Craig_Group_Quotation,pdf.exe 92 PID 3604 wrote to memory of 4300 3604 Explorer.EXE 93 PID 3604 wrote to memory of 4300 3604 Explorer.EXE 93 PID 3604 wrote to memory of 4300 3604 Explorer.EXE 93 PID 4300 wrote to memory of 372 4300 wscript.exe 94 PID 4300 wrote to memory of 372 4300 wscript.exe 94 PID 4300 wrote to memory of 372 4300 wscript.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3604 -
C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3780 -
C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"3⤵PID:3800
-
-
C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1092
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4300 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Craig_Group_Quotation,pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:372
-
-