Analysis
-
max time kernel
147s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
DN 0098667.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DN 0098667.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/tktzsan.dll
Resource
win7-20240729-en
General
-
Target
DN 0098667.exe
-
Size
257KB
-
MD5
cbc03b03f2b8626ec8f8fbcf7382df94
-
SHA1
ac570be606cddbe2ff862555e0b28a368f84df9b
-
SHA256
c8bc547a806fa169df7de512393fa0955c262d808a84758c6fafd5b9f30c8193
-
SHA512
5f55afeea21db580d010663bd29bbf57767d5af804adb1b44c879ee4a4d473992efeacb7bf887e1f1ab703a6497f5384ea2c391f2e1653ceb59d3232a8fb9819
-
SSDEEP
6144:Z8LxBaMfdkQ+JncfjmSxaF58LjaYpf7xHDc/XYw3LpQgF9:NM9+JnSxNP7fHDc/X77Kgf
Malware Config
Extracted
xloader
2.4
r95e
mindyourbusinesscoin.com
melandri.club
13011196.com
bespinpoker.com
ohchainpodklo.xyz
paolacapitanio.com
hnczppjs.com
healthygold-carefit.club
drive16pay.art
5foldmastermind.com
especialistasorteios.online
cjcveterotqze.com
originaldigitalspaces.com
21lawsofconfidence.com
uscryptomininglaws.com
nilist.xyz
bergstromgreenholt.icu
dumbasslures.com
companieus.com
2gtfy0.com
jpbrunos.com
cdsensor.host
memorypc.gmbh
blue-music.com
lottochain.bet
exegen.online
gardenmanager.net
tyczhhapph5.com
financecreditpro.com
you-teikeis.site
portale-accessi-anomali.com
performansorganizasyon.xyz
coinoforum.com
kagulowa.com
kxdrstone.com
projudi-poker.com
glu-coin.com
mremvd.icu
smpldebts.com
gabgbang.com
hoochhousebar.com
zuowxk.icu
whatipm.com
healthcaresms.com
nurhalilah.xyz
platforma-gaz.space
railrats.com
lastmedicalcard.com
1auwifsr.icu
ctgybebuy.com
2377k.com
mightynz.com
sbcsdaia.com
conversionlist.com
ventas.rest
scotlaenlinea.site
byemreperde.com
getsilverberg.com
meannamemories.com
signotimes.com
jhuipx1cnb.xyz
5apchk35.xyz
tspd.site
aoshihuanyu.com
bofight.store
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2852-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2852-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2752-18-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2220 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2860 DN 0098667.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2860 set thread context of 2852 2860 DN 0098667.exe 30 PID 2852 set thread context of 1352 2852 DN 0098667.exe 21 PID 2752 set thread context of 1352 2752 netsh.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DN 0098667.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2852 DN 0098667.exe 2852 DN 0098667.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe 2752 netsh.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2860 DN 0098667.exe 2852 DN 0098667.exe 2852 DN 0098667.exe 2852 DN 0098667.exe 2752 netsh.exe 2752 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2852 DN 0098667.exe Token: SeDebugPrivilege 2752 netsh.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2860 wrote to memory of 2852 2860 DN 0098667.exe 30 PID 2860 wrote to memory of 2852 2860 DN 0098667.exe 30 PID 2860 wrote to memory of 2852 2860 DN 0098667.exe 30 PID 2860 wrote to memory of 2852 2860 DN 0098667.exe 30 PID 2860 wrote to memory of 2852 2860 DN 0098667.exe 30 PID 1352 wrote to memory of 2752 1352 Explorer.EXE 31 PID 1352 wrote to memory of 2752 1352 Explorer.EXE 31 PID 1352 wrote to memory of 2752 1352 Explorer.EXE 31 PID 1352 wrote to memory of 2752 1352 Explorer.EXE 31 PID 2752 wrote to memory of 2220 2752 netsh.exe 32 PID 2752 wrote to memory of 2220 2752 netsh.exe 32 PID 2752 wrote to memory of 2220 2752 netsh.exe 32 PID 2752 wrote to memory of 2220 2752 netsh.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2852
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DN 0098667.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD53d4fc93b0e82d14dc45f93d7c280faa9
SHA14e472ee4f91cd88b7fbc66e2d042bd84783dc889
SHA2564e177339740363323d54016a8b60a135a58d5c1593aa76115acc38e9c7eb10a8
SHA5121eeac5f1f8e87bab84b1048f25f387cebd74d253501ff54a4352074b907e0759ccaedc476013c65ceac4a5206c13b9db72c6d2b81451d4d694ac0eb5bca33e6d