Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
27/03/2025, 08:55
Static task
static1
Behavioral task
behavioral1
Sample
Order Specification Requirement With Ref. AMABINIF38535.exe
Resource
win7-20240903-en
General
-
Target
Order Specification Requirement With Ref. AMABINIF38535.exe
-
Size
558KB
-
MD5
ec44d0c4ec44347f9f8ee63b4bec5210
-
SHA1
362eda0fa5bd2cd4f50d0f7e9cf0cc641a08b163
-
SHA256
ed6182df3469dfdc4084aea0aca3714a90498401d608c7a0ab818329c42ab21f
-
SHA512
ee7e79980421b97fccdbe453c5daa98798fc82e8951c3d6aee49a939a1721e2c885ad22c69721488644f277e719d60d2fd1a8f595ceb370d29d899bbca7e1338
-
SSDEEP
6144:AO6oVJ59N2c3FEyohRbTnIkwcDku8dQDKfcQqUwSLjiXTkgQ:ASJ59r3F0bTnlwcDkuzMcfSLYTTQ
Malware Config
Extracted
xloader
2.2
utau
frenchtogether.info
thefriendsofmaryc.com
meridianconversation.com
pleasingpleasure.com
relliant-rehab.com
meunegocioonlineoficial.com
jutuiess.site
sorelshopitalia.com
minnesotaunited.club
meditationmateau.com
wisheskennel.com
nothingbeatsagreatstory.com
equityinengineering.com
designantageuk.com
towstate.com
floridapremierestates.com
qianwanshang.com
mamentos.info
coraltechnologygroup.com
guoyijidian.com
kamiapp.today
shoppret.com
atomoffice.asia
bosphorusorthopedics.com
juventudvq.com
exm-dronesecurity.online
surfboard-quarterly.com
ahmadhidayah.com
beyondsauerkraut.com
xdlbiyj.icu
fiathfirst.com
jlxrzz.com
takeactionphysio.com
intelligentinvestingtoday.com
bolezi21.com
foodloversdirect.com
northacai.com
ilhadeitaparicatem.com
agroproducts.online
sitokatachinhhang.club
usjiikay.com
finskills.net
content-trip.com
losangeleslandscapedesigner.com
firstamm.com
wilmington.guide
eurokidscreative.com
bussinktransport.com
jjm68.com
5sguy.com
stranded.xyz
sohbetegelin.net
taradiary.com
thespiritualabolitionist.com
xinmotlanchet.online
myworldtwentyfourseven.com
mojhawaii.com
thetruediversity.com
wedividebyzero.com
synchroport.com
bentrecfs.com
thereseraulin.com
monologuestudios.com
emerald-creative.co.uk
querooo.com
Signatures
-
Xloader family
-
Xloader payload 2 IoCs
resource yara_rule behavioral2/memory/4836-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1860-9-0x0000000000840000-0x0000000000869000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4968 set thread context of 4836 4968 Order Specification Requirement With Ref. AMABINIF38535.exe 87 PID 4836 set thread context of 3440 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 55 PID 1860 set thread context of 3440 1860 explorer.exe 55 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Order Specification Requirement With Ref. AMABINIF38535.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ Explorer.EXE Key created \REGISTRY\USER\S-1-5-21-805952410-2104024357-1716932545-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe 1860 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4968 Order Specification Requirement With Ref. AMABINIF38535.exe 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 4836 Order Specification Requirement With Ref. AMABINIF38535.exe 1860 explorer.exe 1860 explorer.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
description pid Process Token: SeDebugPrivilege 4836 Order Specification Requirement With Ref. AMABINIF38535.exe Token: SeDebugPrivilege 1860 explorer.exe Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE Token: SeShutdownPrivilege 3440 Explorer.EXE Token: SeCreatePagefilePrivilege 3440 Explorer.EXE -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 3440 Explorer.EXE -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 4968 wrote to memory of 4836 4968 Order Specification Requirement With Ref. AMABINIF38535.exe 87 PID 4968 wrote to memory of 4836 4968 Order Specification Requirement With Ref. AMABINIF38535.exe 87 PID 4968 wrote to memory of 4836 4968 Order Specification Requirement With Ref. AMABINIF38535.exe 87 PID 4968 wrote to memory of 4836 4968 Order Specification Requirement With Ref. AMABINIF38535.exe 87 PID 3440 wrote to memory of 1860 3440 Explorer.EXE 89 PID 3440 wrote to memory of 1860 3440 Explorer.EXE 89 PID 3440 wrote to memory of 1860 3440 Explorer.EXE 89 PID 1860 wrote to memory of 1336 1860 explorer.exe 94 PID 1860 wrote to memory of 1336 1860 explorer.exe 94 PID 1860 wrote to memory of 1336 1860 explorer.exe 94
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Modifies registry class
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4968 -
C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4836
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Order Specification Requirement With Ref. AMABINIF38535.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1336
-
-