Analysis
-
max time kernel
147s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 23:43
Static task
static1
Behavioral task
behavioral1
Sample
39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39c29125a8c776bd6eed886f346804a23d518b77_1643743531128.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/rrkssezi.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/rrkssezi.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/rrkssezi.dll
-
Size
20KB
-
MD5
0b9de97b386a1a82cee5d3e059b7ec9b
-
SHA1
cc730fba70941afa39a9827fea215c9f099a6d01
-
SHA256
ad29dd53baa1e19fe4cacd99b9dea3b6e7fba8c6d89fe0492244de4414948e21
-
SHA512
b36cef8eb5fdf990ed79fd718a250e6f736e585516b4cfc97b7a0aba6f254e8997d8cf0262b0f4a894dc91e13c2b22aaa1eac554c2e23c42e50e8bc2fae3ad3d
-
SSDEEP
384:cYwn4GqWlh1i9E8LB2T35YjzYDYp0fRBtsoudoq0HNyp:7wnskhU6tTuYkpoudohy
Malware Config
Extracted
xloader
2.5
uar3
sgadvocats.com
mjscannabus.com
hilldaley.com
ksdollhouse.com
hotgiftboutique.com
purebloodsmeet.com
relaunched.info
cap-glove.com
productcollection.store
fulikyy.xyz
remoteaviationjobs.com
bestcleancrystal.com
virtualorganizationpartner.com
bookgocar.com
hattuafhv.quest
makonigroup.com
officecom-myaccount.com
malgorzata-lac.com
e-learningeducators.com
hygilaur.com
kgv-lachswehr.com
salazarcomunicacion.com
robopython.com
corporateequity.online
complianceservicegroup.com
aperza-ex.com
webflowusa.com
asesoriasfinancieras.xyz
missolivesbranches.com
numiquest.com
criskconsultancy.com
gotemup.com
themaptalk.com
lakebalboahalf.com
cateringfrenchcroissant.com
paddocklakerealestate.com
lojaquerosurprezza.store
courtneywhitearmusic.com
geovannimaquinadevendas.online
pricklypairjazz.com
engagedigi.com
conduitforthespirit.com
anaheimaletrail.com
wholesalemall.store
alertsbecu.com
gestion-kayfra.com
youcanstores.com
qsuo.net
formadv.info
dihesia.xyz
carrreir.com
twenteeminuteswithtee.com
realliferenewal.com
officialprokodsukses.icu
stanfordgrouploscabos.com
maxicashpromir.xyz
zysqshjs.com
trc-clicks.com
chsclbd.com
amdproduce.net
republicoflies.com
beaux-parents.com
lucrativeapp.com
milbombas.com
alexanderplaywear.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
resource yara_rule behavioral3/memory/3044-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/3044-5-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/3044-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2880-14-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Suspicious use of SetThreadContext 4 IoCs
description pid Process procid_target PID 2996 set thread context of 3044 2996 rundll32.exe 31 PID 3044 set thread context of 1192 3044 rundll32.exe 21 PID 3044 set thread context of 1192 3044 rundll32.exe 21 PID 2880 set thread context of 1192 2880 chkdsk.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe 2880 chkdsk.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
pid Process 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 3044 rundll32.exe 2880 chkdsk.exe 2880 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3044 rundll32.exe Token: SeDebugPrivilege 2880 chkdsk.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2984 wrote to memory of 2996 2984 rundll32.exe 30 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 2996 wrote to memory of 3044 2996 rundll32.exe 31 PID 1192 wrote to memory of 2880 1192 Explorer.EXE 40 PID 1192 wrote to memory of 2880 1192 Explorer.EXE 40 PID 1192 wrote to memory of 2880 1192 Explorer.EXE 40 PID 1192 wrote to memory of 2880 1192 Explorer.EXE 40 PID 2880 wrote to memory of 2268 2880 chkdsk.exe 41 PID 2880 wrote to memory of 2268 2880 chkdsk.exe 41 PID 2880 wrote to memory of 2268 2880 chkdsk.exe 41 PID 2880 wrote to memory of 2268 2880 chkdsk.exe 41
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2984 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\rrkssezi.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:3044
-
-
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2292
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2696
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2312
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2220
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2344
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2732
-
-
C:\Windows\SysWOW64\autochk.exe"C:\Windows\SysWOW64\autochk.exe"2⤵PID:2864
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2268
-
-