Analysis
-
max time kernel
150s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:29
Static task
static1
Behavioral task
behavioral1
Sample
TNT Documents.exe
Resource
win7-20241010-en
General
-
Target
TNT Documents.exe
-
Size
437KB
-
MD5
b645c00f43011c6c544de85252898b5a
-
SHA1
e56e43d323e9c6e65c5909b8961d81453fca53fa
-
SHA256
a23066484dc83fa51ab36d9dc530799662abf63c7a12ed9cc10acc272e0c14f6
-
SHA512
d9bde87b1d28b37db66a40bfa1a6e765a2dcbe2b23e6034fe1bacf56cbf9d38ccdecec3fcfdd50230d547f1334f038293129f000f42b8ec7f3b2bbaca53400d4
-
SSDEEP
6144:zqwpecjP4vnTNSqMkRwkfIHd/rCPxiPGs25jwtTGOuBdkE4jcZOit7k7YwifsF/0:jpAP8kw7/I7s2JHTBUpiovifshFG
Malware Config
Extracted
xloader
2.5
how6
wealthcabana.com
fourfortyfourcreations.com
cqqcsy.com
bhwzjd.com
niftyfashionrewards.com
andersongiftemporium.com
smarttradingcoin.com
ilarealty.com
sherrywine.net
fsecg.info
xoti.top
pirosconsulting.com
fundapie.com
bbgm4egda.xyz
legalfortmyers.com
improvizy.com
yxdyhs.com
lucky2balls.com
panelmall.com
davenportkartway.com
springfieldlottery.com
pentagonpublishers.com
icanmakeyoufamous.com
40m2k.com
projectcentered.com
webfactory.agency
metronixmedical.com
dalingtao.xyz
functionalsoft.com
klopert77.com
cortepuroiberico.com
viavelleiloes.online
bamedia.online
skolicalunjo.com
kayhardy.com
excellentappraisers.com
sademakale.com
zbycsb.com
empirejewelss.com
coached.info
20215414.online
dazzlehide.com
swickstyle.com
specialtyplastics.online
noordinarysenior.com
bluinfo.digital
chuxiaoxin.xyz
adwin-estate.com
girlwithaglow.com
auctions.email
topekasecurestorage.com
mountain-chicken.com
lhdtrj.com
mhtqph.club
solatopotato.com
mecitiris.com
hotrodathangtrungquoc.com
gapteknews.com
mantraexchange.online
cinematiccarpenter.com
wozka.xyz
car-tech.tech
jssatchell.media
joyokanji-cheer.com
floridanratraining.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2992-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2992-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1720-20-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 1048 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2792 set thread context of 2992 2792 TNT Documents.exe 29 PID 2992 set thread context of 1360 2992 TNT Documents.exe 20 PID 1720 set thread context of 1360 1720 chkdsk.exe 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TNT Documents.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2992 TNT Documents.exe 2992 TNT Documents.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe 1720 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2992 TNT Documents.exe 2992 TNT Documents.exe 2992 TNT Documents.exe 1720 chkdsk.exe 1720 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2992 TNT Documents.exe Token: SeDebugPrivilege 1720 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 2792 wrote to memory of 2992 2792 TNT Documents.exe 29 PID 1360 wrote to memory of 1720 1360 Explorer.EXE 30 PID 1360 wrote to memory of 1720 1360 Explorer.EXE 30 PID 1360 wrote to memory of 1720 1360 Explorer.EXE 30 PID 1360 wrote to memory of 1720 1360 Explorer.EXE 30 PID 1720 wrote to memory of 1048 1720 chkdsk.exe 31 PID 1720 wrote to memory of 1048 1720 chkdsk.exe 31 PID 1720 wrote to memory of 1048 1720 chkdsk.exe 31 PID 1720 wrote to memory of 1048 1720 chkdsk.exe 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2992
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:1048
-
-