Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/03/2025, 08:55 UTC
Static task
static1
Behavioral task
behavioral1
Sample
Order Specification Requirement With Ref. AMABINIF38535.exe
Resource
win7-20240903-en
General
-
Target
Order Specification Requirement With Ref. AMABINIF38535.exe
-
Size
558KB
-
MD5
ec44d0c4ec44347f9f8ee63b4bec5210
-
SHA1
362eda0fa5bd2cd4f50d0f7e9cf0cc641a08b163
-
SHA256
ed6182df3469dfdc4084aea0aca3714a90498401d608c7a0ab818329c42ab21f
-
SHA512
ee7e79980421b97fccdbe453c5daa98798fc82e8951c3d6aee49a939a1721e2c885ad22c69721488644f277e719d60d2fd1a8f595ceb370d29d899bbca7e1338
-
SSDEEP
6144:AO6oVJ59N2c3FEyohRbTnIkwcDku8dQDKfcQqUwSLjiXTkgQ:ASJ59r3F0bTnlwcDkuzMcfSLYTTQ
Malware Config
Extracted
xloader
2.2
utau
frenchtogether.info
thefriendsofmaryc.com
meridianconversation.com
pleasingpleasure.com
relliant-rehab.com
meunegocioonlineoficial.com
jutuiess.site
sorelshopitalia.com
minnesotaunited.club
meditationmateau.com
wisheskennel.com
nothingbeatsagreatstory.com
equityinengineering.com
designantageuk.com
towstate.com
floridapremierestates.com
qianwanshang.com
mamentos.info
coraltechnologygroup.com
guoyijidian.com
kamiapp.today
shoppret.com
atomoffice.asia
bosphorusorthopedics.com
juventudvq.com
exm-dronesecurity.online
surfboard-quarterly.com
ahmadhidayah.com
beyondsauerkraut.com
xdlbiyj.icu
fiathfirst.com
jlxrzz.com
takeactionphysio.com
intelligentinvestingtoday.com
bolezi21.com
foodloversdirect.com
northacai.com
ilhadeitaparicatem.com
agroproducts.online
sitokatachinhhang.club
usjiikay.com
finskills.net
content-trip.com
losangeleslandscapedesigner.com
firstamm.com
wilmington.guide
eurokidscreative.com
bussinktransport.com
jjm68.com
5sguy.com
stranded.xyz
sohbetegelin.net
taradiary.com
thespiritualabolitionist.com
xinmotlanchet.online
myworldtwentyfourseven.com
mojhawaii.com
thetruediversity.com
wedividebyzero.com
synchroport.com
bentrecfs.com
thereseraulin.com
monologuestudios.com
emerald-creative.co.uk
querooo.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral1/memory/1720-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1720-7-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1720-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1660-14-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2892 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2284 set thread context of 1720 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 28 PID 1720 set thread context of 1216 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 21 PID 1720 set thread context of 1216 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 21 PID 1660 set thread context of 1216 1660 colorcpl.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order Specification Requirement With Ref. AMABINIF38535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language colorcpl.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order Specification Requirement With Ref. AMABINIF38535.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe 1660 colorcpl.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 1660 colorcpl.exe 1660 colorcpl.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1720 Order Specification Requirement With Ref. AMABINIF38535.exe Token: SeDebugPrivilege 1660 colorcpl.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2284 wrote to memory of 1720 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 28 PID 2284 wrote to memory of 1720 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 28 PID 2284 wrote to memory of 1720 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 28 PID 2284 wrote to memory of 1720 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 28 PID 2284 wrote to memory of 1720 2284 Order Specification Requirement With Ref. AMABINIF38535.exe 28 PID 1720 wrote to memory of 1660 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 29 PID 1720 wrote to memory of 1660 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 29 PID 1720 wrote to memory of 1660 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 29 PID 1720 wrote to memory of 1660 1720 Order Specification Requirement With Ref. AMABINIF38535.exe 29 PID 1660 wrote to memory of 2892 1660 colorcpl.exe 30 PID 1660 wrote to memory of 2892 1660 colorcpl.exe 30 PID 1660 wrote to memory of 2892 1660 colorcpl.exe 30 PID 1660 wrote to memory of 2892 1660 colorcpl.exe 30
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1216
-
C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"3⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\colorcpl.exe"C:\Windows\SysWOW64\colorcpl.exe"4⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"5⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2892
-
-
-
-