Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:32
Static task
static1
Behavioral task
behavioral1
Sample
b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
b95b2708e33befda87ea5e9970f51f8fb92741b4ccf59ba6e0e81bca5a10aa1b.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ekow.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ekow.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/ekow.dll
-
Size
18KB
-
MD5
4255f992dca6609afe2290b6e31d7e7b
-
SHA1
462ebc74c1078dc04460d4e0403a8adf74d11adb
-
SHA256
f774b50cdcf20dbf9515d6051776e4d7fb7ca4afd2ddb60028d72510f7575a7f
-
SHA512
52ab06e60955cd56e0c15fbcb571f0e08ca96038322e87a4938e9701e1f23a1b52b1286f189c92b564cca38e1371ed181c99d2bdee092dabd3341b42304e0006
-
SSDEEP
384:fB/Tan2ihl3PCCdfx/0LP0641BdnndIxzY3b81t3QKd+D:fRTanRb6Ep8LUB2zY3betgj
Malware Config
Extracted
xloader
2.5
quc5
writerpilotpublishing.com
journeywands.com
madacambo.com
boreslirealestate.com
drillshear.com
urbanmastic.com
focalbunk.com
ghpgroupinc.xyz
rfgmhnvf.com
241mk.com
mandolinzen.com
thenorthstarbets.com
oggperformancehorses.com
webuywholesalerhouses.com
cinreyyy.com
theyoungwedding.com
neuro-ai-web-ru.digital
zavienniky.xyz
kin-school.com
lowratepersonalloans.com
reddindesignco.com
w-planning21.com
contactcenter2.email
bizarrefuid.com
pngok.net
trasportocargo.com
litecoinpricescam.com
klovaperon.quest
ericpcensi.com
gra68.net
bmsr.mobi
phukienstreaming.com
spojed.store
gesips.com
andrewarchitect.com
sifangktv.info
xd16880.com
tudineroenvenezuela.com
scakw.com
sittingysxtfy.xyz
suckit-ice.com
spryget.com
servionexpress.com
dobuncou.xyz
williswear.com
alvinceremiaam.xyz
kashmanltd.com
thebeautydisruptor.com
sherrilyndale.com
edn-by-fges.net
megaverse.estate
albatrosstextile.com
isabel-mirandol.com
jaawo.com
digitalrajputsamaj.com
capital11.store
bortovoycomputezzerkalo.online
tamankertamukti.com
targethic.tech
1006e.com
sahin.business
gosecure.info
spasalonsuite.com
kasko-sigorta.com
augiesautopainting.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral3/memory/2464-1-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral3/memory/2464-3-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral3/memory/2464-5-0x0000000000400000-0x000000000044A000-memory.dmp xloader behavioral3/memory/2464-7-0x0000000000310000-0x0000000000339000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1488 set thread context of 2464 1488 rundll32.exe 30 -
Program crash 1 IoCs
pid pid_target Process procid_target 2744 2464 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 2548 wrote to memory of 1488 2548 rundll32.exe 29 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 1488 wrote to memory of 2464 1488 rundll32.exe 30 PID 2464 wrote to memory of 2744 2464 rundll32.exe 31 PID 2464 wrote to memory of 2744 2464 rundll32.exe 31 PID 2464 wrote to memory of 2744 2464 rundll32.exe 31 PID 2464 wrote to memory of 2744 2464 rundll32.exe 31
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ekow.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ekow.dll,#12⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1488 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ekow.dll,#13⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 5524⤵
- Program crash
PID:2744
-
-
-