Analysis
-
max time kernel
150s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:29
Static task
static1
Behavioral task
behavioral1
Sample
TNT Documents.exe
Resource
win7-20241010-en
General
-
Target
TNT Documents.exe
-
Size
437KB
-
MD5
b645c00f43011c6c544de85252898b5a
-
SHA1
e56e43d323e9c6e65c5909b8961d81453fca53fa
-
SHA256
a23066484dc83fa51ab36d9dc530799662abf63c7a12ed9cc10acc272e0c14f6
-
SHA512
d9bde87b1d28b37db66a40bfa1a6e765a2dcbe2b23e6034fe1bacf56cbf9d38ccdecec3fcfdd50230d547f1334f038293129f000f42b8ec7f3b2bbaca53400d4
-
SSDEEP
6144:zqwpecjP4vnTNSqMkRwkfIHd/rCPxiPGs25jwtTGOuBdkE4jcZOit7k7YwifsF/0:jpAP8kw7/I7s2JHTBUpiovifshFG
Malware Config
Extracted
xloader
2.5
how6
wealthcabana.com
fourfortyfourcreations.com
cqqcsy.com
bhwzjd.com
niftyfashionrewards.com
andersongiftemporium.com
smarttradingcoin.com
ilarealty.com
sherrywine.net
fsecg.info
xoti.top
pirosconsulting.com
fundapie.com
bbgm4egda.xyz
legalfortmyers.com
improvizy.com
yxdyhs.com
lucky2balls.com
panelmall.com
davenportkartway.com
springfieldlottery.com
pentagonpublishers.com
icanmakeyoufamous.com
40m2k.com
projectcentered.com
webfactory.agency
metronixmedical.com
dalingtao.xyz
functionalsoft.com
klopert77.com
cortepuroiberico.com
viavelleiloes.online
bamedia.online
skolicalunjo.com
kayhardy.com
excellentappraisers.com
sademakale.com
zbycsb.com
empirejewelss.com
coached.info
20215414.online
dazzlehide.com
swickstyle.com
specialtyplastics.online
noordinarysenior.com
bluinfo.digital
chuxiaoxin.xyz
adwin-estate.com
girlwithaglow.com
auctions.email
topekasecurestorage.com
mountain-chicken.com
lhdtrj.com
mhtqph.club
solatopotato.com
mecitiris.com
hotrodathangtrungquoc.com
gapteknews.com
mantraexchange.online
cinematiccarpenter.com
wozka.xyz
car-tech.tech
jssatchell.media
joyokanji-cheer.com
floridanratraining.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4556-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4556-10-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/3672-16-0x0000000000980000-0x00000000009A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3080 set thread context of 4556 3080 TNT Documents.exe 96 PID 4556 set thread context of 3504 4556 TNT Documents.exe 56 PID 3672 set thread context of 3504 3672 rundll32.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language TNT Documents.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 52 IoCs
pid Process 4556 TNT Documents.exe 4556 TNT Documents.exe 4556 TNT Documents.exe 4556 TNT Documents.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe 3672 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4556 TNT Documents.exe 4556 TNT Documents.exe 4556 TNT Documents.exe 3672 rundll32.exe 3672 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4556 TNT Documents.exe Token: SeDebugPrivilege 3672 rundll32.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3080 wrote to memory of 4556 3080 TNT Documents.exe 96 PID 3080 wrote to memory of 4556 3080 TNT Documents.exe 96 PID 3080 wrote to memory of 4556 3080 TNT Documents.exe 96 PID 3080 wrote to memory of 4556 3080 TNT Documents.exe 96 PID 3080 wrote to memory of 4556 3080 TNT Documents.exe 96 PID 3080 wrote to memory of 4556 3080 TNT Documents.exe 96 PID 3504 wrote to memory of 3672 3504 Explorer.EXE 97 PID 3504 wrote to memory of 3672 3504 Explorer.EXE 97 PID 3504 wrote to memory of 3672 3504 Explorer.EXE 97 PID 3672 wrote to memory of 1596 3672 rundll32.exe 100 PID 3672 wrote to memory of 1596 3672 rundll32.exe 100 PID 3672 wrote to memory of 1596 3672 rundll32.exe 100
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3504 -
C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3080 -
C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4556
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3672 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1596
-
-