Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:45
Static task
static1
Behavioral task
behavioral1
Sample
DN 0098667.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
DN 0098667.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/tktzsan.dll
Resource
win7-20240729-en
General
-
Target
$PLUGINSDIR/tktzsan.dll
-
Size
20KB
-
MD5
3d4fc93b0e82d14dc45f93d7c280faa9
-
SHA1
4e472ee4f91cd88b7fbc66e2d042bd84783dc889
-
SHA256
4e177339740363323d54016a8b60a135a58d5c1593aa76115acc38e9c7eb10a8
-
SHA512
1eeac5f1f8e87bab84b1048f25f387cebd74d253501ff54a4352074b907e0759ccaedc476013c65ceac4a5206c13b9db72c6d2b81451d4d694ac0eb5bca33e6d
-
SSDEEP
384:fON4md7V4mnY1FnF2f/oTOuEjkZX4FkvYxzk7RJQogdGkYJdxzkyzs+5+ka7t3aD:ZmAmniFnF2fASuYkZOkvmzk7RJQogdP
Malware Config
Extracted
xloader
2.4
r95e
mindyourbusinesscoin.com
melandri.club
13011196.com
bespinpoker.com
ohchainpodklo.xyz
paolacapitanio.com
hnczppjs.com
healthygold-carefit.club
drive16pay.art
5foldmastermind.com
especialistasorteios.online
cjcveterotqze.com
originaldigitalspaces.com
21lawsofconfidence.com
uscryptomininglaws.com
nilist.xyz
bergstromgreenholt.icu
dumbasslures.com
companieus.com
2gtfy0.com
jpbrunos.com
cdsensor.host
memorypc.gmbh
blue-music.com
lottochain.bet
exegen.online
gardenmanager.net
tyczhhapph5.com
financecreditpro.com
you-teikeis.site
portale-accessi-anomali.com
performansorganizasyon.xyz
coinoforum.com
kagulowa.com
kxdrstone.com
projudi-poker.com
glu-coin.com
mremvd.icu
smpldebts.com
gabgbang.com
hoochhousebar.com
zuowxk.icu
whatipm.com
healthcaresms.com
nurhalilah.xyz
platforma-gaz.space
railrats.com
lastmedicalcard.com
1auwifsr.icu
ctgybebuy.com
2377k.com
mightynz.com
sbcsdaia.com
conversionlist.com
ventas.rest
scotlaenlinea.site
byemreperde.com
getsilverberg.com
meannamemories.com
signotimes.com
jhuipx1cnb.xyz
5apchk35.xyz
tspd.site
aoshihuanyu.com
bofight.store
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral4/memory/2692-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/2692-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/2692-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral4/memory/2292-14-0x0000000000770000-0x0000000000799000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 3224 set thread context of 2692 3224 rundll32.exe 84 PID 2692 set thread context of 3408 2692 rundll32.exe 56 PID 2692 set thread context of 3408 2692 rundll32.exe 56 PID 2292 set thread context of 3408 2292 help.exe 56 -
Program crash 1 IoCs
pid pid_target Process procid_target 2740 3224 WerFault.exe 83 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 62 IoCs
pid Process 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe 2292 help.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
pid Process 3224 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2692 rundll32.exe 2292 help.exe 2292 help.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2692 rundll32.exe Token: SeShutdownPrivilege 3408 Explorer.EXE Token: SeCreatePagefilePrivilege 3408 Explorer.EXE Token: SeDebugPrivilege 2292 help.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3472 wrote to memory of 3224 3472 rundll32.exe 83 PID 3472 wrote to memory of 3224 3472 rundll32.exe 83 PID 3472 wrote to memory of 3224 3472 rundll32.exe 83 PID 3224 wrote to memory of 2692 3224 rundll32.exe 84 PID 3224 wrote to memory of 2692 3224 rundll32.exe 84 PID 3224 wrote to memory of 2692 3224 rundll32.exe 84 PID 3224 wrote to memory of 2692 3224 rundll32.exe 84 PID 3408 wrote to memory of 2292 3408 Explorer.EXE 96 PID 3408 wrote to memory of 2292 3408 Explorer.EXE 96 PID 3408 wrote to memory of 2292 3408 Explorer.EXE 96 PID 2292 wrote to memory of 5004 2292 help.exe 99 PID 2292 wrote to memory of 5004 2292 help.exe 99 PID 2292 wrote to memory of 5004 2292 help.exe 99
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3408 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tktzsan.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:3472 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tktzsan.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:3224 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\tktzsan.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3224 -s 7324⤵
- Program crash
PID:2740
-
-
-
-
C:\Windows\SysWOW64\autofmt.exe"C:\Windows\SysWOW64\autofmt.exe"2⤵PID:2148
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:5004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3224 -ip 32241⤵PID:4032