Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
DN 0098667.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DN 0098667.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/tktzsan.dll
Resource
win7-20240729-en
General
-
Target
$PLUGINSDIR/tktzsan.dll
-
Size
20KB
-
MD5
3d4fc93b0e82d14dc45f93d7c280faa9
-
SHA1
4e472ee4f91cd88b7fbc66e2d042bd84783dc889
-
SHA256
4e177339740363323d54016a8b60a135a58d5c1593aa76115acc38e9c7eb10a8
-
SHA512
1eeac5f1f8e87bab84b1048f25f387cebd74d253501ff54a4352074b907e0759ccaedc476013c65ceac4a5206c13b9db72c6d2b81451d4d694ac0eb5bca33e6d
-
SSDEEP
384:fON4md7V4mnY1FnF2f/oTOuEjkZX4FkvYxzk7RJQogdGkYJdxzkyzs+5+ka7t3aD:ZmAmniFnF2fASuYkZOkvmzk7RJQogdP
Malware Config
Extracted
xloader
2.4
r95e
mindyourbusinesscoin.com
melandri.club
13011196.com
bespinpoker.com
ohchainpodklo.xyz
paolacapitanio.com
hnczppjs.com
healthygold-carefit.club
drive16pay.art
5foldmastermind.com
especialistasorteios.online
cjcveterotqze.com
originaldigitalspaces.com
21lawsofconfidence.com
uscryptomininglaws.com
nilist.xyz
bergstromgreenholt.icu
dumbasslures.com
companieus.com
2gtfy0.com
jpbrunos.com
cdsensor.host
memorypc.gmbh
blue-music.com
lottochain.bet
exegen.online
gardenmanager.net
tyczhhapph5.com
financecreditpro.com
you-teikeis.site
portale-accessi-anomali.com
performansorganizasyon.xyz
coinoforum.com
kagulowa.com
kxdrstone.com
projudi-poker.com
glu-coin.com
mremvd.icu
smpldebts.com
gabgbang.com
hoochhousebar.com
zuowxk.icu
whatipm.com
healthcaresms.com
nurhalilah.xyz
platforma-gaz.space
railrats.com
lastmedicalcard.com
1auwifsr.icu
ctgybebuy.com
2377k.com
mightynz.com
sbcsdaia.com
conversionlist.com
ventas.rest
scotlaenlinea.site
byemreperde.com
getsilverberg.com
meannamemories.com
signotimes.com
jhuipx1cnb.xyz
5apchk35.xyz
tspd.site
aoshihuanyu.com
bofight.store
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral3/memory/2456-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2456-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2456-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2724-14-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2108 set thread context of 2456 2108 rundll32.exe 32 PID 2456 set thread context of 1212 2456 rundll32.exe 21 PID 2456 set thread context of 1212 2456 rundll32.exe 21 PID 2724 set thread context of 1212 2724 wlanext.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language wlanext.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2456 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe 2724 wlanext.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 2108 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2456 rundll32.exe 2724 wlanext.exe 2724 wlanext.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2456 rundll32.exe Token: SeDebugPrivilege 2724 wlanext.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2500 wrote to memory of 2108 2500 rundll32.exe 31 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 2108 wrote to memory of 2456 2108 rundll32.exe 32 PID 1212 wrote to memory of 2724 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2724 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2724 1212 Explorer.EXE 33 PID 1212 wrote to memory of 2724 1212 Explorer.EXE 33 PID 2724 wrote to memory of 2412 2724 wlanext.exe 34 PID 2724 wrote to memory of 2412 2724 wlanext.exe 34 PID 2724 wrote to memory of 2412 2724 wlanext.exe 34 PID 2724 wrote to memory of 2412 2724 wlanext.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tktzsan.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tktzsan.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tktzsan.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2456
-
-
-
-
C:\Windows\SysWOW64\wlanext.exe"C:\Windows\SysWOW64\wlanext.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2412
-
-