Analysis
-
max time kernel
145s -
max time network
133s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:59
Static task
static1
Behavioral task
behavioral1
Sample
rev inv07014.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
rev inv07014.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
zwgay.dll
Resource
win7-20240903-en
General
-
Target
zwgay.dll
-
Size
9KB
-
MD5
dcc94fb3455b7726349f6b05f98a9f1e
-
SHA1
ea2160715cddfde302043c8f69b63a3c03bc651d
-
SHA256
3d3288ebb21a28f71417efa86b6a136cb37340f3542ce8e99b267c7b347f73ef
-
SHA512
b3d6e8cae4d6e693b7b726120627a6815d7c5f29c51be26df041edb970727548bdb961b469ed74bc767ab2e27a6be5650122e2b968e81cca0571667277bd6305
-
SSDEEP
192:lxRcBDJ0tI8S85DR8THYS1YNHgTs22FFVFUFF:DqBAxHzIHY0Y2TIrW
Malware Config
Extracted
xloader
2.3
ymri
cqmlhy.com
districtdisinfectant.com
canadohta.com
indipetals.com
zygjzz.com
bodybionixusa.com
myfoodiedoodie.com
littletinesonlinestore.com
zerofive100.com
odd-spaces.com
luxxnights.com
d-electric.com
fastkl.com
mywayinto.com
vitalpassion.com
usedmercedessprinters.net
caofeicao.com
emehciti.com
smartaider.com
ssgasika.com
onlyfansforyou.com
shamtudungrohani.com
imalovenative.com
precisionconsortium.com
757marketwatch.com
fanopt.com
boxagaorbis.com
qweqesdf.com
theburhanigroup.com
szbhsj.com
shriadventpharmaceuticals.com
jerseyzoom.com
salvitooriginalpizzakc.com
809swalnut.info
ay-danil.club
diyforhire.com
foamholding.com
grandpashaevo.com
proyectohuella.com
24runews.online
carvested.com
mirrorteam.com
josetreeexpert.com
fgtts.com
world2worldllc.com
xn--xkrv41icfi.com
ferncroftcronies.com
shamrocksec.com
sterilizair.info
xn--yukdunyas-3pb.com
solisdq.info
hahluxurywatches.com
xrg.xyz
qffweb.com
concrete-lubbock.com
gthb2u.com
fracik.com
123movies-official.com
nikevendor.com
communityhealth-mm.com
calimommaber.com
courtrptrs.com
themindofafunnygirl.com
mindyourtee.com
the7superpowers.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2284-4-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral3/memory/2284-8-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral3/memory/1476-14-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2468 set thread context of 2284 2468 rundll32.exe 32 PID 2284 set thread context of 1216 2284 rundll32.exe 21 PID 1476 set thread context of 1216 1476 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2284 rundll32.exe 2284 rundll32.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe 1476 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2468 rundll32.exe 2284 rundll32.exe 2284 rundll32.exe 2284 rundll32.exe 1476 explorer.exe 1476 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2284 rundll32.exe Token: SeDebugPrivilege 1476 explorer.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2464 wrote to memory of 2468 2464 rundll32.exe 31 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 2468 wrote to memory of 2284 2468 rundll32.exe 32 PID 1216 wrote to memory of 1476 1216 Explorer.EXE 33 PID 1216 wrote to memory of 1476 1216 Explorer.EXE 33 PID 1216 wrote to memory of 1476 1216 Explorer.EXE 33 PID 1216 wrote to memory of 1476 1216 Explorer.EXE 33 PID 1476 wrote to memory of 2156 1476 explorer.exe 34 PID 1476 wrote to memory of 2156 1476 explorer.exe 34 PID 1476 wrote to memory of 2156 1476 explorer.exe 34 PID 1476 wrote to memory of 2156 1476 explorer.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zwgay.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zwgay.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\zwgay.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2284
-
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1476 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2156
-
-