Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:05
Static task
static1
Behavioral task
behavioral1
Sample
payment details-0009854_pdf.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
payment details-0009854_pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/mcubau.dll
Resource
win7-20241010-en
General
-
Target
$PLUGINSDIR/mcubau.dll
-
Size
5KB
-
MD5
2ba43f6b8df6085a174eb44e5c3d9bcd
-
SHA1
ff2b5f680bb972f116e41de8e2a9cef6b0cad9ab
-
SHA256
59d449a56897e850dcd276ad817fced403f3318cd9c08e1d7c70ed96db7092d8
-
SHA512
a72f4f5b3297530478e4d37b63b7e673962a405e2f2d58dd539ee5ad3509ea196cb4bafaf8e09cb584e7ffc4972de709e732e44bc38dfe454d3b65a41a99524e
-
SSDEEP
48:a97yH52gMWZhfChEsHIGmEsH/Gt4BKiZ/seNkTHfav6yYZmEeSRuqS:1H9T4IGN4/GCBKxfQKuix
Malware Config
Extracted
xloader
2.3
xgxp
sin7799.com
konkondwa.com
fixmylot.com
redbirdscottsdale.com
cotcoservices.com
jonwcvxw.com
scotthaeberletriathlon.com
bob816.com
pinukimgood.life
ambitiondurable-ce.com
jioholdingscorp.com
thisisadreamright.com
asaptebal.xyz
sloanehealth.com
huugmooren.com
birdsbarber.supply
albeider.com
theperfectcolour.com
alibabulilmhouston.com
chaing-list.xyz
furrytail.pet
halloweenmaskdealz.com
tagaschool.com
y2kpigeonclub.net
fadedplastic.com
balconyrepairlosangeles.com
eternalgrove.com
thebarbersparadise.com
viverobonsaimx.com
5996399.com
partes-online.com
petunia.digital
permayogi.com
nextingly.com
pricescloud.com
dj-xhsl.com
hdtvallonline.xyz
pinballphotography.com
tourvirtualonline.com
brownhydrogen.com
betsforfree.com
proprietory.com
neidcard.com
dadi2023.xyz
embedded4all.com
biomedms.com
knucklescrubbersoap.com
francenethomas.net
lokalondon.com
charlestonpest.com
kspublishing.media
customordersbyjyl.com
thewebcam.show
kraso.services
kaffeeatlas.com
gavinpropertymanagement.com
esthetic-cocoro.com
hnezx.com
scoutlo.com
humaproyectos.com
bioinfonet.com
freenetflixaccounts.com
rxdrugrehab.com
gajabcreature.com
eleriwyn.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral4/memory/4032-2-0x0000000000600000-0x0000000000628000-memory.dmp xloader behavioral4/memory/4032-7-0x0000000000600000-0x0000000000628000-memory.dmp xloader behavioral4/memory/4416-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 3472 set thread context of 4032 3472 rundll32.exe 84 PID 4032 set thread context of 3408 4032 rundll32.exe 56 PID 4416 set thread context of 3408 4416 wlanext.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4032 rundll32.exe 4032 rundll32.exe 4032 rundll32.exe 4032 rundll32.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe 4416 wlanext.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3472 rundll32.exe 3472 rundll32.exe 4032 rundll32.exe 4032 rundll32.exe 4032 rundll32.exe 4416 wlanext.exe 4416 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4032 rundll32.exe Token: SeDebugPrivilege 4416 wlanext.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 392 wrote to memory of 3472 392 rundll32.exe 83 PID 392 wrote to memory of 3472 392 rundll32.exe 83 PID 392 wrote to memory of 3472 392 rundll32.exe 83 PID 3472 wrote to memory of 4032 3472 rundll32.exe 84 PID 3472 wrote to memory of 4032 3472 rundll32.exe 84 PID 3472 wrote to memory of 4032 3472 rundll32.exe 84 PID 3472 wrote to memory of 4032 3472 rundll32.exe 84 PID 3408 wrote to memory of 4416 3408 Explorer.EXE 85 PID 3408 wrote to memory of 4416 3408 Explorer.EXE 85 PID 3408 wrote to memory of 4416 3408 Explorer.EXE 85 PID 4416 wrote to memory of 1924 4416 wlanext.exe 93 PID 4416 wrote to memory of 1924 4416 wlanext.exe 93 PID 4416 wrote to memory of 1924 4416 wlanext.exe 93
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mcubau.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:392 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mcubau.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mcubau.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4032
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4416 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1924
-
-