Analysis
-
max time kernel
146s -
max time network
19s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
payment details-0009854_pdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
payment details-0009854_pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/mcubau.dll
Resource
win7-20241010-en
General
-
Target
$PLUGINSDIR/mcubau.dll
-
Size
5KB
-
MD5
2ba43f6b8df6085a174eb44e5c3d9bcd
-
SHA1
ff2b5f680bb972f116e41de8e2a9cef6b0cad9ab
-
SHA256
59d449a56897e850dcd276ad817fced403f3318cd9c08e1d7c70ed96db7092d8
-
SHA512
a72f4f5b3297530478e4d37b63b7e673962a405e2f2d58dd539ee5ad3509ea196cb4bafaf8e09cb584e7ffc4972de709e732e44bc38dfe454d3b65a41a99524e
-
SSDEEP
48:a97yH52gMWZhfChEsHIGmEsH/Gt4BKiZ/seNkTHfav6yYZmEeSRuqS:1H9T4IGN4/GCBKxfQKuix
Malware Config
Extracted
xloader
2.3
xgxp
sin7799.com
konkondwa.com
fixmylot.com
redbirdscottsdale.com
cotcoservices.com
jonwcvxw.com
scotthaeberletriathlon.com
bob816.com
pinukimgood.life
ambitiondurable-ce.com
jioholdingscorp.com
thisisadreamright.com
asaptebal.xyz
sloanehealth.com
huugmooren.com
birdsbarber.supply
albeider.com
theperfectcolour.com
alibabulilmhouston.com
chaing-list.xyz
furrytail.pet
halloweenmaskdealz.com
tagaschool.com
y2kpigeonclub.net
fadedplastic.com
balconyrepairlosangeles.com
eternalgrove.com
thebarbersparadise.com
viverobonsaimx.com
5996399.com
partes-online.com
petunia.digital
permayogi.com
nextingly.com
pricescloud.com
dj-xhsl.com
hdtvallonline.xyz
pinballphotography.com
tourvirtualonline.com
brownhydrogen.com
betsforfree.com
proprietory.com
neidcard.com
dadi2023.xyz
embedded4all.com
biomedms.com
knucklescrubbersoap.com
francenethomas.net
lokalondon.com
charlestonpest.com
kspublishing.media
customordersbyjyl.com
thewebcam.show
kraso.services
kaffeeatlas.com
gavinpropertymanagement.com
esthetic-cocoro.com
hnezx.com
scoutlo.com
humaproyectos.com
bioinfonet.com
freenetflixaccounts.com
rxdrugrehab.com
gajabcreature.com
eleriwyn.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2260-5-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral3/memory/2260-10-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral3/memory/2548-16-0x0000000000080000-0x00000000000A8000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2264 set thread context of 2260 2264 rundll32.exe 30 PID 2260 set thread context of 1220 2260 rundll32.exe 21 PID 2548 set thread context of 1220 2548 cmmon32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2260 rundll32.exe 2260 rundll32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe 2548 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2264 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2260 rundll32.exe 2548 cmmon32.exe 2548 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2260 rundll32.exe Token: SeDebugPrivilege 2548 cmmon32.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2248 wrote to memory of 2264 2248 rundll32.exe 29 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 2264 wrote to memory of 2260 2264 rundll32.exe 30 PID 1220 wrote to memory of 2548 1220 Explorer.EXE 31 PID 1220 wrote to memory of 2548 1220 Explorer.EXE 31 PID 1220 wrote to memory of 2548 1220 Explorer.EXE 31 PID 1220 wrote to memory of 2548 1220 Explorer.EXE 31 PID 2548 wrote to memory of 2508 2548 cmmon32.exe 32 PID 2548 wrote to memory of 2508 2548 cmmon32.exe 32 PID 2548 wrote to memory of 2508 2548 cmmon32.exe 32 PID 2548 wrote to memory of 2508 2548 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mcubau.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mcubau.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mcubau.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2508
-
-