Analysis
-
max time kernel
146s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 05:39
Static task
static1
Behavioral task
behavioral1
Sample
1e3b17f9813300bb214a12a8be41217770ff025e7e595431e1712b14a55df1ac.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
1e3b17f9813300bb214a12a8be41217770ff025e7e595431e1712b14a55df1ac.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ztqv.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ztqv.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/ztqv.dll
-
Size
32KB
-
MD5
97d84d39bb68b5a29e976b40d7d0a00c
-
SHA1
cf4c09487fffb9ace9ab6b82f33da0d5a851ef1c
-
SHA256
5b29c5ee49d9cdde15d88a9e4f8f6b4bba9e2dc4ec65c02d734726fe0f2952c8
-
SHA512
aab5b8831538f96c00e77f16349065bfaa93e7b25206a6d5fe0871f518f38ae31437f2f9f93f36f488e1869eaf97dd4697a282d726ce9a292cf4276242733546
-
SSDEEP
384:0ajTrn6tBFCu8OW5x8Yz7x4qTNe730g3ErkdjrNRKJNPqDuqYASKmIWoIVgQrz/L:0ajfEoVOUN2x3ErIrCNPmuVhIW9zf/L
Malware Config
Extracted
xloader
2.5
m5cw
stolpfabriken.com
aromaessentialco.com
rmcclaincpa.com
wuruixin.com
sidhyanticlasses.com
horilka.store
organic-outlaws.com
customsoftwarelogistics.com
cheryltesting.com
thecompacthomegym.com
the22yards.club
quickloanprovidersservices.com
grippyent.com
guard-usa.com
agircredit.com
classificationmetallurgie.com
quizzesandcode.com
catdanos.com
8676789.rest
gotbestshavlngplansforyou.com
supboarddesign.com
byrdemailplans.xyz
anngola.com
milelefoods.com
runawaypklyau.xyz
redesignyourpain.com
yourtv2ship.info
jxypc.com
lerjighjuij.store
spiruline-shop.com
qarziba-therapy.care
hardayumangosteen.com
freevolttech.com
xiongbaosp.xyz
balanzasdeplataforma.com
johnathanmanney.com
estcequecestgreen.com
france-temps-partage.net
fbiicrc.com
privateairjets.com
xn--5m4a23skoc.group
andrewmurnane.com
exitin90.com
depofmvz.com
bosphorus.website
aragon.store
nrnmuhendislik.com
thesharingcorporation.com
tccraft.online
carjabber.com
limitlesschurchbf.com
dazalogistics.com
x-play.club
bitterbay.net
forwardhcd.com
smance.xyz
netgearcloud.net
wellaspiron.com
heidelay.xyz
qknzutohbtro.mobi
epurhybrid.com
pelitupmukaeksklusif.com
secondave.online
lockdownshowdown.online
art-for-a-cause.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral3/memory/2292-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2292-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2608-10-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rundll32.exerundll32.exemsdt.exedescription pid process target process PID 2940 set thread context of 2292 2940 rundll32.exe rundll32.exe PID 2292 set thread context of 1192 2292 rundll32.exe Explorer.EXE PID 2608 set thread context of 1192 2608 msdt.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exemsdt.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msdt.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
rundll32.exemsdt.exepid process 2292 rundll32.exe 2292 rundll32.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe 2608 msdt.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
rundll32.exemsdt.exepid process 2292 rundll32.exe 2292 rundll32.exe 2292 rundll32.exe 2608 msdt.exe 2608 msdt.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exemsdt.exedescription pid process Token: SeDebugPrivilege 2292 rundll32.exe Token: SeDebugPrivilege 2608 msdt.exe -
Suspicious use of WriteProcessMemory 25 IoCs
Processes:
rundll32.exerundll32.exeExplorer.EXEmsdt.exedescription pid process target process PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2728 wrote to memory of 2940 2728 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 2940 wrote to memory of 2292 2940 rundll32.exe rundll32.exe PID 1192 wrote to memory of 2608 1192 Explorer.EXE msdt.exe PID 1192 wrote to memory of 2608 1192 Explorer.EXE msdt.exe PID 1192 wrote to memory of 2608 1192 Explorer.EXE msdt.exe PID 1192 wrote to memory of 2608 1192 Explorer.EXE msdt.exe PID 2608 wrote to memory of 2612 2608 msdt.exe cmd.exe PID 2608 wrote to memory of 2612 2608 msdt.exe cmd.exe PID 2608 wrote to memory of 2612 2608 msdt.exe cmd.exe PID 2608 wrote to memory of 2612 2608 msdt.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
-
C:\Windows\SysWOW64\msdt.exe"C:\Windows\SysWOW64\msdt.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2612
-
-