Analysis
-
max time kernel
149s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
PO#11112100012.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
PO#11112100012.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/jdzq.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/jdzq.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/jdzq.dll
-
Size
34KB
-
MD5
3cbfaabed5bfdf7ba91b2239ff4f54ae
-
SHA1
f135231f2966ef23161b8744cf5c4d321234d1e0
-
SHA256
369665e2448df9c8a1dce71ca14a508f4767ee7b4a141a39d662fff5a523a1a3
-
SHA512
a4a9bddc5d0c805f15974dc5b975196f9af26fdf8285c6d7ffbdcb22f3529d44863e8616cb33167f0b3a456e07cbd71fae3916b1c0c792317f36b90565e6184d
-
SSDEEP
768:F+Fegdn2Nn9Zee2WcRUHx7cLemtcuRAoTGgV:FXggN943WcRywem+uRAoKgV
Malware Config
Extracted
xloader
2.5
rgv6
goodluck-shop.com
bra866.com
act2design.com
highclear.xyz
luneeatery.com
northeasttexasperio.com
lowresvideo.com
xn--gmqxk523cur2c.com
64382.online
duiqx.icu
successsuitsu.com
monarchscaffolding.com
bodybybetsy.com
bambooquotes.com
maktabeahlesunnat.com
francetempspartage.com
ivcleanse.care
vessel-wave.com
perranormalidad.com
inkhacks.com
ruggedimperial.com
acupuncturespeciallongevity.com
quick-tempered.com
inmobiliariapuertalavilla.com
ypqmmi.biz
tokyo-kyokuoukai.com
myclassify.club
pinkdragonflyfarms.com
lyceecondorcet.info
flipperfornrz.xyz
fmhra.online
exclusiveescortsmelbourne.com
freedomofmovement.digital
agrestemotors.com
improvizy.com
347391.com
brewsandreview.com
vpixar77.com
carlsbadandco.com
clauders.club
flushfreshz.info
haiwanghuyu.com
thealanhotel.com
haojiangbei.com
inv111.com
matajigroup.com
visaractivesprepaidscard.com
miukyshop.online
qipaiqx.com
soulshine.today
gtamgcqyxc.com
roganprybars.com
villanovas.com
summergreenarea.com
bjhwky.com
libell-provence.store
dgyijiabz.com
dicasdomentor.com
024atk.xyz
kokeguchisetsubi.com
portraitsbypaul.com
maschinenkrieger.com
kurtlee.club
xn--pgb3df.com
decorationnews.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/1560-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/1560-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2268-9-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2536 set thread context of 1560 2536 rundll32.exe 32 PID 1560 set thread context of 1368 1560 rundll32.exe 21 PID 2268 set thread context of 1368 2268 msdt.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 1560 rundll32.exe 1560 rundll32.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe 2268 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 1560 rundll32.exe 1560 rundll32.exe 1560 rundll32.exe 2268 msdt.exe 2268 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1560 rundll32.exe Token: SeDebugPrivilege 2268 msdt.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 1104 wrote to memory of 2536 1104 rundll32.exe 31 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 2536 wrote to memory of 1560 2536 rundll32.exe 32 PID 1368 wrote to memory of 2268 1368 Explorer.EXE 33 PID 1368 wrote to memory of 2268 1368 Explorer.EXE 33 PID 1368 wrote to memory of 2268 1368 Explorer.EXE 33 PID 1368 wrote to memory of 2268 1368 Explorer.EXE 33 PID 2268 wrote to memory of 2488 2268 msdt.exe 34 PID 2268 wrote to memory of 2488 2268 msdt.exe 34 PID 2268 wrote to memory of 2488 2268 msdt.exe 34 PID 2268 wrote to memory of 2488 2268 msdt.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jdzq.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1104 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jdzq.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\jdzq.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1560
-
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2488
-
-