Analysis
-
max time kernel
147s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:15
Static task
static1
Behavioral task
behavioral1
Sample
2640ec73eb8aa419bbcf1819bb1062dcc7bbc8a1ec30c1a975e80e3182449f67.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2640ec73eb8aa419bbcf1819bb1062dcc7bbc8a1ec30c1a975e80e3182449f67.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/hvlovmp.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/hvlovmp.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/hvlovmp.dll
-
Size
4KB
-
MD5
326a702abb396435221880fd71450249
-
SHA1
62f5a8e24469859250a5630e5b9280b8472e5a56
-
SHA256
f936817179febc934e8fa271aac522f989e6a6b43ebf42a44588f71ecae79042
-
SHA512
3018fa492ecbba49350db3f93df5f20852a47dd363315704737b2abd9c70bf86cc74858572a267e7fb79f8590c064ebaa0024ac84b41fb7fb684a3c23f7da615
Malware Config
Extracted
xloader
2.5
0pu8
washyearwake.space
s-takata.com
sattadelhiborder47.xyz
watch-tbn.net
hklawns.com
schuylkillc.com
brightonbybench.xyz
treslrefinance.com
redwoodwomen.com
les4asdudekhockey.com
clarityandflow.coach
d-spor.online
1agiostratitis.com
ai-technology-online-ru.digital
eightstraps.com
qingus.com
it321.net
cryptochatr.com
swguangna.com
jax3.website
9978444.com
basyxfurniture.info
pakistanbeauty.info
algoritmos.online
lorikriley.store
ihs-cab.com
nowosee.com
cleanandgreenenv.com
17coronet.com
tenlog066.xyz
32dgj.xyz
kingdomworldtravels.com
feedfxbg.com
klever.creditcard
mybank-key.com
i-bodydesign.com
174881.com
vinehillcorp.com
simpsonvillepies.com
movementformamas.com
vseobogrevateli.com
ammarus.com
qloiq.com
xn--wmqs2f37k76ag02q.com
sdtengke.com
eporn.club
portakal.info
rilpublicrelations.com
three60vr.com
ipayimpact-onlinepayments.net
texasshydraulics.com
dalaishipinkeji.com
sebastianlouder.com
golittlepet.com
islandtimecharterspr.com
soldatkistore.com
newoffice-fur.com
moneyhate.biz
sunrisewholesalellc.com
mailthecryptolarkdavis.com
nanokanehara.com
spirtualorca.com
ikkbs-c01.com
xemphimlatmat5.com
qyfz88.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2456-2-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2456-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2860-13-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2352 set thread context of 2456 2352 rundll32.exe 31 PID 2456 set thread context of 1180 2456 rundll32.exe 21 PID 2860 set thread context of 1180 2860 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2456 rundll32.exe 2456 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2456 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2860 rundll32.exe 2860 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2456 rundll32.exe Token: SeDebugPrivilege 2860 rundll32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2856 wrote to memory of 2352 2856 rundll32.exe 30 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 2352 wrote to memory of 2456 2352 rundll32.exe 31 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 1180 wrote to memory of 2860 1180 Explorer.EXE 32 PID 2860 wrote to memory of 2920 2860 rundll32.exe 33 PID 2860 wrote to memory of 2920 2860 rundll32.exe 33 PID 2860 wrote to memory of 2920 2860 rundll32.exe 33 PID 2860 wrote to memory of 2920 2860 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hvlovmp.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hvlovmp.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hvlovmp.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2920
-
-