Analysis
-
max time kernel
146s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:26
Static task
static1
Behavioral task
behavioral1
Sample
39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/rrkssezi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/rrkssezi.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/rrkssezi.dll
-
Size
20KB
-
MD5
0b9de97b386a1a82cee5d3e059b7ec9b
-
SHA1
cc730fba70941afa39a9827fea215c9f099a6d01
-
SHA256
ad29dd53baa1e19fe4cacd99b9dea3b6e7fba8c6d89fe0492244de4414948e21
-
SHA512
b36cef8eb5fdf990ed79fd718a250e6f736e585516b4cfc97b7a0aba6f254e8997d8cf0262b0f4a894dc91e13c2b22aaa1eac554c2e23c42e50e8bc2fae3ad3d
-
SSDEEP
384:cYwn4GqWlh1i9E8LB2T35YjzYDYp0fRBtsoudoq0HNyp:7wnskhU6tTuYkpoudohy
Malware Config
Extracted
xloader
2.5
uar3
sgadvocats.com
mjscannabus.com
hilldaley.com
ksdollhouse.com
hotgiftboutique.com
purebloodsmeet.com
relaunched.info
cap-glove.com
productcollection.store
fulikyy.xyz
remoteaviationjobs.com
bestcleancrystal.com
virtualorganizationpartner.com
bookgocar.com
hattuafhv.quest
makonigroup.com
officecom-myaccount.com
malgorzata-lac.com
e-learningeducators.com
hygilaur.com
kgv-lachswehr.com
salazarcomunicacion.com
robopython.com
corporateequity.online
complianceservicegroup.com
aperza-ex.com
webflowusa.com
asesoriasfinancieras.xyz
missolivesbranches.com
numiquest.com
criskconsultancy.com
gotemup.com
themaptalk.com
lakebalboahalf.com
cateringfrenchcroissant.com
paddocklakerealestate.com
lojaquerosurprezza.store
courtneywhitearmusic.com
geovannimaquinadevendas.online
pricklypairjazz.com
engagedigi.com
conduitforthespirit.com
anaheimaletrail.com
wholesalemall.store
alertsbecu.com
gestion-kayfra.com
youcanstores.com
qsuo.net
formadv.info
dihesia.xyz
carrreir.com
twenteeminuteswithtee.com
realliferenewal.com
officialprokodsukses.icu
stanfordgrouploscabos.com
maxicashpromir.xyz
zysqshjs.com
trc-clicks.com
chsclbd.com
amdproduce.net
republicoflies.com
beaux-parents.com
lucrativeapp.com
milbombas.com
alexanderplaywear.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/3032-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/3032-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2220-10-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2172 set thread context of 3032 2172 rundll32.exe 31 PID 3032 set thread context of 1200 3032 rundll32.exe 21 PID 2220 set thread context of 1200 2220 wscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3032 rundll32.exe 3032 rundll32.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe 2220 wscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 3032 rundll32.exe 3032 rundll32.exe 3032 rundll32.exe 2220 wscript.exe 2220 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3032 rundll32.exe Token: SeDebugPrivilege 2220 wscript.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2700 wrote to memory of 2172 2700 rundll32.exe 30 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 2172 wrote to memory of 3032 2172 rundll32.exe 31 PID 1200 wrote to memory of 2220 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2220 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2220 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2220 1200 Explorer.EXE 32 PID 2220 wrote to memory of 2112 2220 wscript.exe 33 PID 2220 wrote to memory of 2112 2220 wscript.exe 33 PID 2220 wrote to memory of 2112 2220 wscript.exe 33 PID 2220 wrote to memory of 2112 2220 wscript.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3032
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2112
-
-