Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:04
Static task
static1
Behavioral task
behavioral1
Sample
65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
65b8d28cc93ef078954f569422e9292298e638a11a6bb681c85065c84e042bff.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/gbywalds.dll
Resource
win7-20240729-en
General
-
Target
$PLUGINSDIR/gbywalds.dll
-
Size
12KB
-
MD5
5b7950419e981b94f2d78ba5f70b8f47
-
SHA1
007b19f9267c8634a7b4b488770ae1f667655c20
-
SHA256
6e11a5bb985683f9d03865289565124c11ce2c481a9a505866602cc950c80f5e
-
SHA512
03d2a63385fa404e3fec62b16af9baa3ae93c26250e3ab1b104b6bb42542a7690d182faa50c5f27e89d4a8d00306ba252a188df9109667ca964ba80640882e65
-
SSDEEP
192:KBGz5UZNGzZmzQnR4XrQiE+BZ2jrEQN/MOm6yD4yht/8RR0A:aGnmzsaZEpfj9nyD4su
Malware Config
Extracted
xloader
2.3
oqxs
northkoreamatrimony.com
we11studio.net
ekviraonewaycab.com
biakbiak.com
pdmclinic.com
biophots.com
shaydd.com
uplandpro.com
newcrestredchrisltd.com
aventuragaming.com
righteousrewards.com
pengwinz.com
ganey-hn.com
gz-bbe.com
xicauyb.com
historyfive.com
racofix.net
teetimeforyou.com
perfumeriadeverano.com
electrumkeys.works
sellyourleesburghome.com
thecomplexityoftruth.com
kxpan.com
avdhutraut.com
457ebhw.com
papelparede365.com
eastmidlandschauffeurgroup.com
seventhcircleofhelena.com
aprendeonline10.com
nirvanaremote.icu
ntra120.com
ultrafor.asia
ayoadventure.com
sellingsunsetmarbella.com
titanlifeinsurance.com
ansarimc.com
poslinkhub.club
sensationdrone.com
massapequawaterbill.com
advancedfiltrationconcepts.net
patriotfarmshepherds.com
tb1919.com
ferienkompass.com
error404page.com
pricegr8.com
sante-evolutionshop.com
sebiexchange.com
loimaannettiapteekki.net
xn--mad-drb.com
solutionsessentialoil.com
champavatipipes.com
kiddiecarenc.com
detemptationsrevue.com
topservices1.site
mimikis.info
weekendanorak.com
xn--zmremlak-skbc.com
bioworldng.com
thealliancestand.com
blackleadershippodcast.com
portmacquarievodka.com
pointpermis-france.com
fuzzue.com
virusfriendlybusinesses.com
e-commercehispano.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral4/memory/4800-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/4800-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/1252-10-0x00000000001D0000-0x00000000001F9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4840 set thread context of 4800 4840 rundll32.exe 85 PID 4800 set thread context of 3436 4800 rundll32.exe 56 PID 1252 set thread context of 3436 1252 NETSTAT.EXE 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1252 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4800 rundll32.exe 4800 rundll32.exe 4800 rundll32.exe 4800 rundll32.exe 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE 1252 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 4840 rundll32.exe 4800 rundll32.exe 4800 rundll32.exe 4800 rundll32.exe 1252 NETSTAT.EXE 1252 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4800 rundll32.exe Token: SeDebugPrivilege 1252 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3800 wrote to memory of 4840 3800 rundll32.exe 84 PID 3800 wrote to memory of 4840 3800 rundll32.exe 84 PID 3800 wrote to memory of 4840 3800 rundll32.exe 84 PID 4840 wrote to memory of 4800 4840 rundll32.exe 85 PID 4840 wrote to memory of 4800 4840 rundll32.exe 85 PID 4840 wrote to memory of 4800 4840 rundll32.exe 85 PID 4840 wrote to memory of 4800 4840 rundll32.exe 85 PID 3436 wrote to memory of 1252 3436 Explorer.EXE 86 PID 3436 wrote to memory of 1252 3436 Explorer.EXE 86 PID 3436 wrote to memory of 1252 3436 Explorer.EXE 86 PID 1252 wrote to memory of 2696 1252 NETSTAT.EXE 89 PID 1252 wrote to memory of 2696 1252 NETSTAT.EXE 89 PID 1252 wrote to memory of 2696 1252 NETSTAT.EXE 89
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gbywalds.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3800 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gbywalds.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\gbywalds.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4800
-
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2696
-
-