Analysis
-
max time kernel
117s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:31
Static task
static1
Behavioral task
behavioral1
Sample
1e3b17f9813300bb214a12a8be41217770ff025e7e595431e1712b14a55df1ac.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1e3b17f9813300bb214a12a8be41217770ff025e7e595431e1712b14a55df1ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ztqv.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ztqv.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/ztqv.dll
-
Size
32KB
-
MD5
97d84d39bb68b5a29e976b40d7d0a00c
-
SHA1
cf4c09487fffb9ace9ab6b82f33da0d5a851ef1c
-
SHA256
5b29c5ee49d9cdde15d88a9e4f8f6b4bba9e2dc4ec65c02d734726fe0f2952c8
-
SHA512
aab5b8831538f96c00e77f16349065bfaa93e7b25206a6d5fe0871f518f38ae31437f2f9f93f36f488e1869eaf97dd4697a282d726ce9a292cf4276242733546
-
SSDEEP
384:0ajTrn6tBFCu8OW5x8Yz7x4qTNe730g3ErkdjrNRKJNPqDuqYASKmIWoIVgQrz/L:0ajfEoVOUN2x3ErIrCNPmuVhIW9zf/L
Malware Config
Extracted
xloader
2.5
m5cw
stolpfabriken.com
aromaessentialco.com
rmcclaincpa.com
wuruixin.com
sidhyanticlasses.com
horilka.store
organic-outlaws.com
customsoftwarelogistics.com
cheryltesting.com
thecompacthomegym.com
the22yards.club
quickloanprovidersservices.com
grippyent.com
guard-usa.com
agircredit.com
classificationmetallurgie.com
quizzesandcode.com
catdanos.com
8676789.rest
gotbestshavlngplansforyou.com
supboarddesign.com
byrdemailplans.xyz
anngola.com
milelefoods.com
runawaypklyau.xyz
redesignyourpain.com
yourtv2ship.info
jxypc.com
lerjighjuij.store
spiruline-shop.com
qarziba-therapy.care
hardayumangosteen.com
freevolttech.com
xiongbaosp.xyz
balanzasdeplataforma.com
johnathanmanney.com
estcequecestgreen.com
france-temps-partage.net
fbiicrc.com
privateairjets.com
xn--5m4a23skoc.group
andrewmurnane.com
exitin90.com
depofmvz.com
bosphorus.website
aragon.store
nrnmuhendislik.com
thesharingcorporation.com
tccraft.online
carjabber.com
limitlesschurchbf.com
dazalogistics.com
x-play.club
bitterbay.net
forwardhcd.com
smance.xyz
netgearcloud.net
wellaspiron.com
heidelay.xyz
qknzutohbtro.mobi
epurhybrid.com
pelitupmukaeksklusif.com
secondave.online
lockdownshowdown.online
art-for-a-cause.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral3/memory/2080-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2080-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2080-8-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/1220-14-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 1684 set thread context of 2080 1684 rundll32.exe 31 PID 2080 set thread context of 1188 2080 rundll32.exe 21 PID 2080 set thread context of 1188 2080 rundll32.exe 21 PID 1220 set thread context of 1188 1220 explorer.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 25 IoCs
pid Process 2080 rundll32.exe 2080 rundll32.exe 2080 rundll32.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe 1220 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 2080 rundll32.exe 2080 rundll32.exe 2080 rundll32.exe 2080 rundll32.exe 1220 explorer.exe 1220 explorer.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2080 rundll32.exe Token: SeDebugPrivilege 1220 explorer.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 2648 wrote to memory of 1684 2648 rundll32.exe 30 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1684 wrote to memory of 2080 1684 rundll32.exe 31 PID 1188 wrote to memory of 1220 1188 Explorer.EXE 32 PID 1188 wrote to memory of 1220 1188 Explorer.EXE 32 PID 1188 wrote to memory of 1220 1188 Explorer.EXE 32 PID 1188 wrote to memory of 1220 1188 Explorer.EXE 32 PID 1220 wrote to memory of 1844 1220 explorer.exe 33 PID 1220 wrote to memory of 1844 1220 explorer.exe 33 PID 1220 wrote to memory of 1844 1220 explorer.exe 33 PID 1220 wrote to memory of 1844 1220 explorer.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2080
-
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1844
-
-