Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
21-04-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice MT103_PDF.exe
Resource
win7-20240221-en
General
-
Target
Payment_Advice MT103_PDF.exe
-
Size
1.3MB
-
MD5
73697bb26242562cc3b9fde3de369fcb
-
SHA1
7551d770c6358c3ec5483e12882a42eacc12e854
-
SHA256
6b63415f87f97a86a998a5b78bb16953a25b6a045df9a8593432169ec65bcaaf
-
SHA512
f1838d11737b8501b73c4afbe0d5b3fc3bf4ada6dd894985edaf707fc358a9ba24a291407eb1fa15a95a178df886469536e3a3994486d9c9966814851099b2ee
-
SSDEEP
24576:wmpZ76DOqfx8Dgyfx8DgM1dUEOePbzE+XsdainTlQwDZD2L:jZ76v58Dgy58DgM1dMeDzgaiHZK
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral1/memory/2444-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2444-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/1232-22-0x0000000000100000-0x0000000000128000-memory.dmp xloader behavioral1/memory/1232-24-0x0000000000100000-0x0000000000128000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1624 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Payment_Advice MT103_PDF.exePayment_Advice MT103_PDF.execmmon32.exedescription pid process target process PID 1808 set thread context of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 2444 set thread context of 1212 2444 Payment_Advice MT103_PDF.exe Explorer.EXE PID 1232 set thread context of 1212 1232 cmmon32.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
Payment_Advice MT103_PDF.execmmon32.exepid process 2444 Payment_Advice MT103_PDF.exe 2444 Payment_Advice MT103_PDF.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe 1232 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Payment_Advice MT103_PDF.execmmon32.exepid process 2444 Payment_Advice MT103_PDF.exe 2444 Payment_Advice MT103_PDF.exe 2444 Payment_Advice MT103_PDF.exe 1232 cmmon32.exe 1232 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment_Advice MT103_PDF.execmmon32.exedescription pid process Token: SeDebugPrivilege 2444 Payment_Advice MT103_PDF.exe Token: SeDebugPrivilege 1232 cmmon32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Payment_Advice MT103_PDF.exeExplorer.EXEcmmon32.exedescription pid process target process PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1808 wrote to memory of 2444 1808 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 1212 wrote to memory of 1232 1212 Explorer.EXE cmmon32.exe PID 1212 wrote to memory of 1232 1212 Explorer.EXE cmmon32.exe PID 1212 wrote to memory of 1232 1212 Explorer.EXE cmmon32.exe PID 1212 wrote to memory of 1232 1212 Explorer.EXE cmmon32.exe PID 1232 wrote to memory of 1624 1232 cmmon32.exe cmd.exe PID 1232 wrote to memory of 1624 1232 cmmon32.exe cmd.exe PID 1232 wrote to memory of 1624 1232 cmmon32.exe cmd.exe PID 1232 wrote to memory of 1624 1232 cmmon32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1212-17-0x0000000003A90000-0x0000000003B90000-memory.dmpFilesize
1024KB
-
memory/1212-28-0x0000000002DE0000-0x0000000002EAB000-memory.dmpFilesize
812KB
-
memory/1212-19-0x0000000002DE0000-0x0000000002EAB000-memory.dmpFilesize
812KB
-
memory/1232-27-0x0000000001E70000-0x0000000001EFF000-memory.dmpFilesize
572KB
-
memory/1232-24-0x0000000000100000-0x0000000000128000-memory.dmpFilesize
160KB
-
memory/1232-23-0x0000000002000000-0x0000000002303000-memory.dmpFilesize
3.0MB
-
memory/1232-22-0x0000000000100000-0x0000000000128000-memory.dmpFilesize
160KB
-
memory/1232-21-0x0000000000A60000-0x0000000000A6D000-memory.dmpFilesize
52KB
-
memory/1232-20-0x0000000000A60000-0x0000000000A6D000-memory.dmpFilesize
52KB
-
memory/1808-6-0x0000000005E20000-0x0000000005EBA000-memory.dmpFilesize
616KB
-
memory/1808-7-0x00000000005F0000-0x000000000061E000-memory.dmpFilesize
184KB
-
memory/1808-1-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1808-13-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1808-2-0x0000000001000000-0x0000000001040000-memory.dmpFilesize
256KB
-
memory/1808-3-0x0000000000280000-0x0000000000292000-memory.dmpFilesize
72KB
-
memory/1808-4-0x0000000074460000-0x0000000074B4E000-memory.dmpFilesize
6.9MB
-
memory/1808-5-0x0000000001000000-0x0000000001040000-memory.dmpFilesize
256KB
-
memory/1808-0-0x0000000001320000-0x0000000001466000-memory.dmpFilesize
1.3MB
-
memory/2444-14-0x00000000009A0000-0x0000000000CA3000-memory.dmpFilesize
3.0MB
-
memory/2444-8-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2444-16-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2444-18-0x0000000000230000-0x0000000000240000-memory.dmpFilesize
64KB
-
memory/2444-9-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/2444-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmpFilesize
4KB
-
memory/2444-12-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB