Analysis
-
max time kernel
146s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 21:18
Static task
static1
Behavioral task
behavioral1
Sample
1741b050332dd1a6189cb5f6367a198d4528edafff28b1b71930ec2acb385830.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1741b050332dd1a6189cb5f6367a198d4528edafff28b1b71930ec2acb385830.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/zntsolrgxs.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/zntsolrgxs.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/zntsolrgxs.dll
-
Size
38KB
-
MD5
fe76b0ef249aebd98f82d6437721c047
-
SHA1
b1d40595e05da9c6f8627885b36177d4ecd54f21
-
SHA256
39724fa50de7a8937dec84a3f00fe23c9dea895d312bdce8133db18f15ee1a81
-
SHA512
abff3bc26f23c3c864bca8bb4ef1191278bb88bf5d604db949a822fc98525bcecdc21acceffbca1aae5557c8a13e9e15092837bc1c16b3ec2d03c6b3fc8fd725
-
SSDEEP
384:429M1kCo19eJhv2BqFKrtR1836QF0q5knzxRCT+7BoY3Vq5b1520IVXOFCfl:4rQ19eJhDFKJ7arF0gkpoY3w5baVMA
Malware Config
Extracted
xloader
2.5
d6pu
ifixcreditatl.com
productgeekout.com
electricvehicle-insurance.com
kuiper.business
cloudenglabs.com
gorbepari.com
collecthappy.com
amykrussell.store
clubhousebusinesscourse.com
aplussinifiklima.com
slewis.design
atticwitt.com
galenota.com
griphook.xyz
gsjbd1.club
bootystrapfitness.com
emflawrhks.com
alternativedata.investments
eyehealthtnpasumo3.xyz
naturanzaec.com
vinotrentino.info
thisevent.com
joaopedroeviviane.com
fructuosopascualehijos.net
nftokenartwork.com
gymzara.com
erwan-gueldy-transexual.net
enjoyjourneys.com
sanguinejewellery.com
xxxafricain.com
besrbee.com
kefirusa.com
dualdrivesystem.com
brixbol.com
cor-pt.com
myrhannover.com
entospt.com
slabiesplin.quest
rebuildablecarsonline.com
gangom.com
msulthony.tech
thesmithyvan.com
dharma33.com
rjm226.com
yourbestproduct.com
hyderabadmotorclub.com
karlitomarx.com
sunflowerediting.com
seangreenphotography.com
vikramsparmar.com
roguelakegames.com
globaltechmeet.com
wmr.agency
buksi.biz
ratnagirikosh.com
charleskinzel.com
dunavulkan.quest
diffamr.net
ceveye.com
ss0235.com
7u2mjf.com
getavan.net
thinkcentury.net
diasporahealthfoundation.com
bonitaspringshomesearch.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral3/memory/580-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/580-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2208-11-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
Processes:
rundll32.exerundll32.exerundll32.exedescription pid process target process PID 1256 set thread context of 580 1256 rundll32.exe rundll32.exe PID 580 set thread context of 1196 580 rundll32.exe Explorer.EXE PID 2208 set thread context of 1196 2208 rundll32.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
rundll32.exerundll32.exerundll32.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
Processes:
rundll32.exerundll32.exepid process 580 rundll32.exe 580 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
rundll32.exerundll32.exepid process 580 rundll32.exe 580 rundll32.exe 580 rundll32.exe 2208 rundll32.exe 2208 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
rundll32.exerundll32.exedescription pid process Token: SeDebugPrivilege 580 rundll32.exe Token: SeDebugPrivilege 2208 rundll32.exe -
Suspicious use of WriteProcessMemory 28 IoCs
Processes:
rundll32.exerundll32.exeExplorer.EXErundll32.exedescription pid process target process PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 2480 wrote to memory of 1256 2480 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1256 wrote to memory of 580 1256 rundll32.exe rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 1196 wrote to memory of 2208 1196 Explorer.EXE rundll32.exe PID 2208 wrote to memory of 2472 2208 rundll32.exe cmd.exe PID 2208 wrote to memory of 2472 2208 rundll32.exe cmd.exe PID 2208 wrote to memory of 2472 2208 rundll32.exe cmd.exe PID 2208 wrote to memory of 2472 2208 rundll32.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1196 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zntsolrgxs.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zntsolrgxs.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1256 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\zntsolrgxs.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:580
-
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2472
-
-