Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:42
Static task
static1
Behavioral task
behavioral1
Sample
FACTURA.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
FACTURA.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/772vhhojj684oi.dll
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/772vhhojj684oi.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
URGENT Request for Quotation.pdf.exe
Resource
win7-20240903-en
General
-
Target
$PLUGINSDIR/772vhhojj684oi.dll
-
Size
5KB
-
MD5
5e3d3dadd742c63f01034fb9175caef2
-
SHA1
a3c3cdd8ba24655f36ef248678efe1fade8bc6e8
-
SHA256
c5e4e3bca252502d2c1b4dd9af51de6f14f495b97965e6f0cb9689ce2501afe1
-
SHA512
6d19e6f22dd4442baf620111e4370ebe83acde452240dfb171c6492051f9cbede8d1c0a7de538d012e20ef98e07d61ed1e126050a890425f4a868f27a4d66440
-
SSDEEP
96:EBxUgFl44+MRTXtEm1Rtwz6SJtxuR3kx:E1lRTv1Rtwz6
Malware Config
Extracted
xloader
2.3
u8nw
constructionjadams.com
organicwellnessfarm.com
beautiful.tours
medvows.com
foxparanormal.com
fsmxmc.com
graniterealestategroup.net
qgi1.com
astrologicsolutions.com
rafbar.com
bastiontools.net
emotist.com
stacyleets.com
bloodtypealpha.com
healtybenenfitsplus.com
vavadadoa3.com
chefbenhk.com
dotgz.com
xn--z4qm188e645c.com
ethyi.com
farrellforcouncil.com
everythingcornea.com
pensje.net
haichuanxin.com
codeproper.com
beautyblvdca.com
namastecarrier.com
xtrator.com
alphabrainbalancing.com
sensationalcleaningservices.net
magistv.info
shotsbynox.com
zioninfosystems.net
yourstoryplace.com
ebmulla.com
turkeyvisa-government.com
albertsonsolutions.com
7brochasmagicas.com
revolutiontourselsalvador.com
eastboundanddowntrucking.com
jkskylights.com
ultimatepoolwater.com
diurr.com
investmentfocused.com
dogscanstay.com
inov8digital.com
paragoncraftevents.com
reservesunbeds.com
melaniesalascosmetics.com
vissito.com
axolc-upoc.xyz
customessayjojo.com
kladki.com
online-securegov.com
xn--demirelik-u3a.com
plgmap.com
contorig2.com
dgyzgs8.com
valuedmind.com
sanacolitademarijuana.com
xn--6j1bs50berk.com
labkitsforstudents.com
lifehakershagirl.online
candidanddevout.com
onyxcomputing.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral4/memory/4008-1-0x0000000000390000-0x00000000003B9000-memory.dmp xloader behavioral4/memory/4008-5-0x0000000000390000-0x00000000003B9000-memory.dmp xloader behavioral4/memory/4008-9-0x0000000000390000-0x00000000003B9000-memory.dmp xloader behavioral4/memory/4712-15-0x0000000000430000-0x0000000000459000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3924 set thread context of 4008 3924 rundll32.exe 83 PID 4008 set thread context of 3396 4008 rundll32.exe 56 PID 4008 set thread context of 3396 4008 rundll32.exe 56 PID 4712 set thread context of 3396 4712 wscript.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe 4712 wscript.exe -
Suspicious behavior: MapViewOfSection 8 IoCs
pid Process 3924 rundll32.exe 3924 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4008 rundll32.exe 4712 wscript.exe 4712 wscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4008 rundll32.exe Token: SeDebugPrivilege 4712 wscript.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2160 wrote to memory of 3924 2160 rundll32.exe 82 PID 2160 wrote to memory of 3924 2160 rundll32.exe 82 PID 2160 wrote to memory of 3924 2160 rundll32.exe 82 PID 3924 wrote to memory of 4008 3924 rundll32.exe 83 PID 3924 wrote to memory of 4008 3924 rundll32.exe 83 PID 3924 wrote to memory of 4008 3924 rundll32.exe 83 PID 3924 wrote to memory of 4008 3924 rundll32.exe 83 PID 3396 wrote to memory of 4712 3396 Explorer.EXE 84 PID 3396 wrote to memory of 4712 3396 Explorer.EXE 84 PID 3396 wrote to memory of 4712 3396 Explorer.EXE 84 PID 4712 wrote to memory of 428 4712 wscript.exe 87 PID 4712 wrote to memory of 428 4712 wscript.exe 87 PID 4712 wrote to memory of 428 4712 wscript.exe 87
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3396 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\772vhhojj684oi.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\772vhhojj684oi.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\772vhhojj684oi.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4008
-
-
-
-
C:\Windows\SysWOW64\wscript.exe"C:\Windows\SysWOW64\wscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4712 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:428
-
-