Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:11
Static task
static1
Behavioral task
behavioral1
Sample
6e06b764495fc246c57c604363ccc21db72c8a4776660b852ee000cbe6a488a4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
6e06b764495fc246c57c604363ccc21db72c8a4776660b852ee000cbe6a488a4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/nbcnvvhhow.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/nbcnvvhhow.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/nbcnvvhhow.dll
-
Size
20KB
-
MD5
967aaecddf0e31f0de8582942a26d086
-
SHA1
1ca5be0f614bb4db3608dfc0f549e5cf83442164
-
SHA256
de93a37794cf18a166c2a36646997ab128da7cd6b5b540f6f596de537bcde8ef
-
SHA512
bfd279d0ceea9f5e70466977989d89cf2885eca8713c63885ad2cac32e3030eb87a3237c71191448f6c026222a3bfb61a47944b2fd548f393bcc1a4313191a66
-
SSDEEP
384:QAMYwn4GqWlh1i9E8LB2T35YjzYDYp0fRBtsoudoq0rH+eNyp:QArwnskhU6tTuYkpoudoPty
Malware Config
Extracted
xloader
2.5
d5tt
air-bas.com
index1.one
liceist.com
racuch.com
slav-net.store
mermadekusse.store
tccaponline.online
thetalkzone.com
victoriajayde.com
wellbosoft.com
supericehockey.pro
empiredigitalweednews.com
veloci-cloud.com
all-blocks.com
malagainvestments.com
wildgiantelephant.online
surveyplatform.net
missinggate.com
cnonwovens.net
winecountryexcursions.store
stoltenbergmates.com
travel2cook.com
buxfast.com
cq755.com
yugongh.info
tomita-kokusai.com
eldesigns.art
bl1bl.com
jazz-bands.com
ourgoodybag.com
mbetsa.com
flatearthuniversity.net
unitybookkeepingsolutions.com
solitaire-onlineplay.com
balatonconcerto.com
royaltycraftsupplies.com
datumhard.quest
sppn.info
spinruggedvinyl.com
sarasotagulfcoastrealestate.com
heitwin.xyz
kristinehamnshockeyteam.com
sagepantryandhome.com
edfimv.space
kyriazisfruits.com
bradburya.top
digitalmarketingagency786.com
thejoannaha.com
download-youtube-thumbnail.com
mysazoo9.com
magnoliadivineworld.com
idealminds.net
s-w-e-m.com
era353.com
shintodesign.com
swampfyre.com
ymsociety.com
oxygencanister.com
ieeeservices.com
memberjp.com
testedivov.com
buresdx.com
iabg.xyz
moonshot.rentals
phamhongthai.xyz
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2408-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2408-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2276-10-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2532 set thread context of 2408 2532 rundll32.exe 31 PID 2408 set thread context of 1200 2408 rundll32.exe 21 PID 2276 set thread context of 1200 2276 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2408 rundll32.exe 2408 rundll32.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe 2276 wlanext.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2408 rundll32.exe 2408 rundll32.exe 2408 rundll32.exe 2276 wlanext.exe 2276 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2408 rundll32.exe Token: SeDebugPrivilege 2276 wlanext.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2260 wrote to memory of 2532 2260 rundll32.exe 30 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 2532 wrote to memory of 2408 2532 rundll32.exe 31 PID 1200 wrote to memory of 2276 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2276 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2276 1200 Explorer.EXE 32 PID 1200 wrote to memory of 2276 1200 Explorer.EXE 32 PID 2276 wrote to memory of 2104 2276 wlanext.exe 33 PID 2276 wrote to memory of 2104 2276 wlanext.exe 33 PID 2276 wrote to memory of 2104 2276 wlanext.exe 33 PID 2276 wrote to memory of 2104 2276 wlanext.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbcnvvhhow.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2260 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbcnvvhhow.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\nbcnvvhhow.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2408
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2104
-
-