Analysis
-
max time kernel
145s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:46
Static task
static1
Behavioral task
behavioral1
Sample
PO1922.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
PO1922.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/hahe.dll
Resource
win7-20241023-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/hahe.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/hahe.dll
-
Size
19KB
-
MD5
c2011862c7102ab56ad2b1d8bd68d39b
-
SHA1
92bd5b2ed09c6c291732a5de851863410e97dd7d
-
SHA256
441abd6663c6823e8ac2c1facfa6bd147e28504c43dee969376ec6cfceb898d3
-
SHA512
c9971837b6b420ae4d72f265b118cce6667116d3d00c5731856708ae8b7c93070fafd34a62bcef0890014cefd115a5ef6d92f380735fac415b1a129c256187fd
-
SSDEEP
384:7XKkht2za/ke5vkgNEIp5xTkEb0sckt64w1Ka9eC8ll:7XK0t2L2xAEooBBJr
Malware Config
Extracted
xloader
2.5
ssac
beautybybrin.com
oregemo.com
prospectoriq.com
blazermid.com
cloudnineloans.com
myyntisofta.com
filoupoils.com
web-solutiontnpasumo3.xyz
becbares.com
lines-hikkoshi.com
ohayouwww.com
writingdadsobituarywithdad.com
bridalbaes.com
jamshir.com
rangertots.com
dankbrobeans.com
titan111.com
uplearns.info
maxicashprokil.xyz
evc24.com
mingshan888.com
thehomefurnishings.com
jjyive.space
vtkk.info
state-attorney.online
zoho.systems
nd300.com
ivermectinforanimals.ca
gruppobenedetto.com
planet99angka.xyz
astrotiq.com
fangshensj.com
ocean.limited
zalaridumpf.quest
cursolibreonline.com
lifein.art
identspactures.com
nfltvgo.com
chronicfit.store
mariajosereina.com
hebbz764776341.com
anpxlmmspix.mobi
mydevhub.tech
nobelrealm.com
dentalteamny.com
patinerd.com
socratisbey.xyz
hnylcwfs.com
yujieqin.com
midorato.com
sunglowdragon.com
americaplr.com
cxqdscape.com
situsgacor.xyz
sattlerei-dortmund.com
life120lospaccio.com
riddleme.one
perpustakaan-geominerba.online
renatafaceandbodyskincare.com
allkoreas.com
myvisitiq.com
candlesallday.com
poleador.com
4hsp116.com
homesbyvw.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/836-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/836-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2512-9-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2988 set thread context of 836 2988 rundll32.exe 31 PID 836 set thread context of 1128 836 rundll32.exe 20 PID 2512 set thread context of 1128 2512 NETSTAT.EXE 20 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NETSTAT.EXE Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 2512 NETSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 836 rundll32.exe 836 rundll32.exe 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE 2512 NETSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 836 rundll32.exe 836 rundll32.exe 836 rundll32.exe 2512 NETSTAT.EXE 2512 NETSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 836 rundll32.exe Token: SeDebugPrivilege 2512 NETSTAT.EXE -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 1548 wrote to memory of 2988 1548 rundll32.exe 30 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 2988 wrote to memory of 836 2988 rundll32.exe 31 PID 1128 wrote to memory of 2512 1128 Explorer.EXE 32 PID 1128 wrote to memory of 2512 1128 Explorer.EXE 32 PID 1128 wrote to memory of 2512 1128 Explorer.EXE 32 PID 1128 wrote to memory of 2512 1128 Explorer.EXE 32 PID 2512 wrote to memory of 2296 2512 NETSTAT.EXE 34 PID 2512 wrote to memory of 2296 2512 NETSTAT.EXE 34 PID 2512 wrote to memory of 2296 2512 NETSTAT.EXE 34 PID 2512 wrote to memory of 2296 2512 NETSTAT.EXE 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hahe.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hahe.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2988 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\hahe.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
-
-
C:\Windows\SysWOW64\NETSTAT.EXE"C:\Windows\SysWOW64\NETSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2296
-
-