Analysis
-
max time kernel
149s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
22-11-2024 07:41
Static task
static1
Behavioral task
behavioral1
Sample
8df2d74b5e18e72df64a8c00c3029ab3dc4cdd34cc30911be682316f9028c280.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
8df2d74b5e18e72df64a8c00c3029ab3dc4cdd34cc30911be682316f9028c280.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/spgmjdph.dll
Resource
win7-20240729-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/spgmjdph.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/spgmjdph.dll
-
Size
93KB
-
MD5
0fbc559ab75e9cd8326de1b0aa075a8f
-
SHA1
ea1c07acf1913c487c18060380a71bfe18b72791
-
SHA256
bdf272998ebda2e91775e6a463ff01cfcf1cdbdbec3309bb61caaf1b5d28eec4
-
SHA512
72b83b58dc1ec3051557431b50b146784f43fcdb0d5c9f6bef7c9876d8455908f3c486be561567e71b2036fb13ad6739f713d4205b079a6c379b4306154ed1f6
-
SSDEEP
1536:j5ERZT7DoOkA0L0zM5oDB6HKbWyhe2FBbUfs9Cg5+l1OB:j5ERZTPoOkA0avBge55+l
Malware Config
Extracted
xloader
2.5
seqa
alstartnpasumo5.xyz
jarvisbranding.com
kyiv-bdsm.club
hunttools.info
bantaleautomotiveengineers.com
comercioexpresschilpancingo.com
smallbusinessalliancegroup.com
swlawfirmok.com
marketciphermerch.com
gxmmvcn.icu
betwonsikayet.com
bise.tech
minismi2.com
bucklestylez.com
hereford-cattle.com
yufude.com
tangerineinit.com
destinyforfreedom.com
team-rwby-project.com
richardkmartinez.store
aazmok.com
omgaan.xyz
homeadditon.com
bmsafetyconsulting.com
one-wayyhvsdi.online
newviewannarbor.com
nourishtothrive.online
simplyhoodclothing.com
sylverrepair.com
mogyog.com
evitarestafas.online
insurgo.group
scienceworldapub.com
supeusps.com
schtefo.net
fashiononriverwalk.com
aaronlala.store
boggbages.com
pebinfraprojects.com
sm4885.com
cijie.quest
neuhausimmobilien.com
apsdigital.online
clocksimplyforest.xyz
abtransportes.com
nuvy.digital
jeewancoco.com
tr-forexcoin.com
aimenssushi.com
agenciavectores.com
webmakers.xyz
rooms-1247163.com
selangyihao3.xyz
doulaiba.net
sxuseon.com
doquro.com
nbbb2.com
mariaconsultores.com
javsite.xyz
reclaimingeurope.com
albertaint.com
sattaking-delhiborder14.xyz
cardealsukorg.com
homeschoolreading.academy
hybridsea.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2880-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2880-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2212-10-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2164 set thread context of 2880 2164 rundll32.exe 30 PID 2880 set thread context of 1196 2880 rundll32.exe 20 PID 2212 set thread context of 1196 2212 NAPSTAT.EXE 20 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NAPSTAT.EXE -
Suspicious behavior: EnumeratesProcesses 32 IoCs
pid Process 2880 rundll32.exe 2880 rundll32.exe 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2880 rundll32.exe 2880 rundll32.exe 2880 rundll32.exe 2212 NAPSTAT.EXE 2212 NAPSTAT.EXE -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2880 rundll32.exe Token: SeDebugPrivilege 2212 NAPSTAT.EXE -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2116 wrote to memory of 2164 2116 rundll32.exe 29 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 2164 wrote to memory of 2880 2164 rundll32.exe 30 PID 1196 wrote to memory of 2212 1196 Explorer.EXE 31 PID 1196 wrote to memory of 2212 1196 Explorer.EXE 31 PID 1196 wrote to memory of 2212 1196 Explorer.EXE 31 PID 1196 wrote to memory of 2212 1196 Explorer.EXE 31
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\spgmjdph.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\spgmjdph.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\spgmjdph.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2880
-
-
-
-
C:\Windows\SysWOW64\NAPSTAT.EXE"C:\Windows\SysWOW64\NAPSTAT.EXE"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2212
-