Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:00
Static task
static1
Behavioral task
behavioral1
Sample
Payment Receipt.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Payment Receipt.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/zmdtm.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/zmdtm.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/zmdtm.dll
-
Size
100KB
-
MD5
d4b3308970835c85d3d24ad2f8ee3b4f
-
SHA1
8a3722200f614f37a0a446c36df6dfcbd26ae138
-
SHA256
14c94199dc9e370703b5579066d6b34a2055ab97fdf2675dd7ac8ec3616c3137
-
SHA512
72b50aed7860dfa674a34e52a75b6a9aaf3529f4a8dcc7a622f5d00970855dd5cd70a0e9699fd9b79acdfb9a06411ecbee26c471e6a91e67851464dd7b4ca240
-
SSDEEP
1536:gF15tzIksRHS1oD+ajCWmzx3e6fch6gqZ3ralsWjcdWRPbUK7xkm75Cm:gFDhWss0YKWRPbH7uol
Malware Config
Extracted
xloader
2.5
poub
my-access.cloud
tcmylg.com
theemployeesolutions.com
mawanstory.com
themarketerz.com
negoking.net
dridgebaseball.com
instantbookings.space
idoocam.com
showfunds.net
walletsvalidationconnet.com
e-scapes.ltd
itsoizy.com
176821.com
antiinflammatory-diet.com
esloke-1.com
plumbersincali.com
intercitydrywall.com
cartwheeldesigns.com
griffinjamesdesign.com
solvid.biz
xn--vuqp5fg3jm71ahpf.net
hydraulichome.com
edu-proof.com
gledajtv.online
sd-pefilm.com
eagleminingllc.com
delsamgroup.com
artillectoraml.com
devcapfinance.com
alveslawoffice.net
theathleticcompanies.com
psimlew.com
skaliz.com
swangchitmongolsombat.com
shorewindventures.com
lyetras.com
whistlemvmxel.online
sextbilisi.com
yourboxpr.com
jlg-consulting.net
coinkub.com
vindbaaralscoach.online
pgonline222.online
tchlnos.xyz
nordicaswiss.com
totalpopsociety.com
workwithmarym.com
prime-spot.store
sinrokh.com
betterlate.online
usdtaddress.com
calasemail.com
blacklace.club
heirespect.xyz
yana-amur.com
hearinglossapp.com
cusimarket.com
onlinebiyoloji.online
tangodo9.info
amortize.xyz
kkargo.com
realtradebot.icu
madforcreations.com
megdb.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2056-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2056-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2932-10-0x00000000000D0000-0x00000000000F9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2380 set thread context of 2056 2380 rundll32.exe 31 PID 2056 set thread context of 1256 2056 rundll32.exe 21 PID 2932 set thread context of 1256 2932 mstsc.exe 21 -
Program crash 1 IoCs
pid pid_target Process procid_target 2072 2380 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mstsc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2056 rundll32.exe 2056 rundll32.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe 2932 mstsc.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2056 rundll32.exe 2056 rundll32.exe 2056 rundll32.exe 2932 mstsc.exe 2932 mstsc.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2056 rundll32.exe Token: SeDebugPrivilege 2932 mstsc.exe Token: SeShutdownPrivilege 1256 Explorer.EXE Token: SeShutdownPrivilege 1256 Explorer.EXE -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2364 wrote to memory of 2380 2364 rundll32.exe 30 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2056 2380 rundll32.exe 31 PID 2380 wrote to memory of 2072 2380 rundll32.exe 32 PID 2380 wrote to memory of 2072 2380 rundll32.exe 32 PID 2380 wrote to memory of 2072 2380 rundll32.exe 32 PID 2380 wrote to memory of 2072 2380 rundll32.exe 32 PID 1256 wrote to memory of 2932 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2932 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2932 1256 Explorer.EXE 33 PID 1256 wrote to memory of 2932 1256 Explorer.EXE 33 PID 2932 wrote to memory of 2128 2932 mstsc.exe 35 PID 2932 wrote to memory of 2128 2932 mstsc.exe 35 PID 2932 wrote to memory of 2128 2932 mstsc.exe 35 PID 2932 wrote to memory of 2128 2932 mstsc.exe 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zmdtm.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zmdtm.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zmdtm.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2056
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2380 -s 2484⤵
- Program crash
PID:2072
-
-
-
-
C:\Windows\SysWOW64\mstsc.exe"C:\Windows\SysWOW64\mstsc.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2932 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2128
-
-