Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240412-en -
resource tags
arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system -
submitted
21-04-2024 02:34
Static task
static1
Behavioral task
behavioral1
Sample
Payment_Advice MT103_PDF.exe
Resource
win7-20240221-en
General
-
Target
Payment_Advice MT103_PDF.exe
-
Size
1.3MB
-
MD5
73697bb26242562cc3b9fde3de369fcb
-
SHA1
7551d770c6358c3ec5483e12882a42eacc12e854
-
SHA256
6b63415f87f97a86a998a5b78bb16953a25b6a045df9a8593432169ec65bcaaf
-
SHA512
f1838d11737b8501b73c4afbe0d5b3fc3bf4ada6dd894985edaf707fc358a9ba24a291407eb1fa15a95a178df886469536e3a3994486d9c9966814851099b2ee
-
SSDEEP
24576:wmpZ76DOqfx8Dgyfx8DgM1dUEOePbzE+XsdainTlQwDZD2L:jZ76v58Dgy58DgM1dMeDzgaiHZK
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral2/memory/4940-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/4940-19-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/868-22-0x0000000000190000-0x00000000001B8000-memory.dmp xloader behavioral2/memory/868-24-0x0000000000190000-0x00000000001B8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Payment_Advice MT103_PDF.exePayment_Advice MT103_PDF.execscript.exedescription pid process target process PID 4488 set thread context of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 4940 set thread context of 3496 4940 Payment_Advice MT103_PDF.exe Explorer.EXE PID 868 set thread context of 3496 868 cscript.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 40 IoCs
Processes:
Payment_Advice MT103_PDF.execscript.exepid process 4940 Payment_Advice MT103_PDF.exe 4940 Payment_Advice MT103_PDF.exe 4940 Payment_Advice MT103_PDF.exe 4940 Payment_Advice MT103_PDF.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe 868 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Payment_Advice MT103_PDF.execscript.exepid process 4940 Payment_Advice MT103_PDF.exe 4940 Payment_Advice MT103_PDF.exe 4940 Payment_Advice MT103_PDF.exe 868 cscript.exe 868 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Payment_Advice MT103_PDF.execscript.exedescription pid process Token: SeDebugPrivilege 4940 Payment_Advice MT103_PDF.exe Token: SeDebugPrivilege 868 cscript.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3496 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Payment_Advice MT103_PDF.exeExplorer.EXEcscript.exedescription pid process target process PID 4488 wrote to memory of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 4488 wrote to memory of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 4488 wrote to memory of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 4488 wrote to memory of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 4488 wrote to memory of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 4488 wrote to memory of 4940 4488 Payment_Advice MT103_PDF.exe Payment_Advice MT103_PDF.exe PID 3496 wrote to memory of 868 3496 Explorer.EXE cscript.exe PID 3496 wrote to memory of 868 3496 Explorer.EXE cscript.exe PID 3496 wrote to memory of 868 3496 Explorer.EXE cscript.exe PID 868 wrote to memory of 2344 868 cscript.exe cmd.exe PID 868 wrote to memory of 2344 868 cscript.exe cmd.exe PID 868 wrote to memory of 2344 868 cscript.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Payment_Advice MT103_PDF.exe"3⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/868-26-0x0000000002880000-0x000000000290F000-memory.dmpFilesize
572KB
-
memory/868-24-0x0000000000190000-0x00000000001B8000-memory.dmpFilesize
160KB
-
memory/868-23-0x0000000002530000-0x000000000287A000-memory.dmpFilesize
3.3MB
-
memory/868-22-0x0000000000190000-0x00000000001B8000-memory.dmpFilesize
160KB
-
memory/868-21-0x0000000000040000-0x0000000000067000-memory.dmpFilesize
156KB
-
memory/868-20-0x0000000000040000-0x0000000000067000-memory.dmpFilesize
156KB
-
memory/3496-18-0x00000000025F0000-0x000000000277A000-memory.dmpFilesize
1.5MB
-
memory/3496-33-0x0000000007C60000-0x0000000007DD0000-memory.dmpFilesize
1.4MB
-
memory/3496-30-0x0000000007C60000-0x0000000007DD0000-memory.dmpFilesize
1.4MB
-
memory/3496-29-0x0000000007C60000-0x0000000007DD0000-memory.dmpFilesize
1.4MB
-
memory/4488-6-0x00000000050F0000-0x000000000518C000-memory.dmpFilesize
624KB
-
memory/4488-8-0x00000000746D0000-0x0000000074E80000-memory.dmpFilesize
7.7MB
-
memory/4488-1-0x00000000746D0000-0x0000000074E80000-memory.dmpFilesize
7.7MB
-
memory/4488-14-0x00000000746D0000-0x0000000074E80000-memory.dmpFilesize
7.7MB
-
memory/4488-2-0x0000000005280000-0x0000000005824000-memory.dmpFilesize
5.6MB
-
memory/4488-10-0x0000000008DB0000-0x0000000008E4A000-memory.dmpFilesize
616KB
-
memory/4488-3-0x0000000004D70000-0x0000000004E02000-memory.dmpFilesize
584KB
-
memory/4488-4-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4488-9-0x0000000004F30000-0x0000000004F40000-memory.dmpFilesize
64KB
-
memory/4488-11-0x0000000007C60000-0x0000000007C8E000-memory.dmpFilesize
184KB
-
memory/4488-7-0x00000000047F0000-0x0000000004802000-memory.dmpFilesize
72KB
-
memory/4488-0-0x0000000000210000-0x0000000000356000-memory.dmpFilesize
1.3MB
-
memory/4488-5-0x0000000004D50000-0x0000000004D5A000-memory.dmpFilesize
40KB
-
memory/4940-19-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB
-
memory/4940-17-0x00000000013A0000-0x00000000013B0000-memory.dmpFilesize
64KB
-
memory/4940-16-0x00000000017F0000-0x0000000001B3A000-memory.dmpFilesize
3.3MB
-
memory/4940-12-0x0000000000400000-0x0000000000428000-memory.dmpFilesize
160KB