Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
06-01-2025 19:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_371c76d36256463a54d34e12d6741720.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
JaffaCakes118_371c76d36256463a54d34e12d6741720.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/ztqv.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/ztqv.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/ztqv.dll
-
Size
32KB
-
MD5
97d84d39bb68b5a29e976b40d7d0a00c
-
SHA1
cf4c09487fffb9ace9ab6b82f33da0d5a851ef1c
-
SHA256
5b29c5ee49d9cdde15d88a9e4f8f6b4bba9e2dc4ec65c02d734726fe0f2952c8
-
SHA512
aab5b8831538f96c00e77f16349065bfaa93e7b25206a6d5fe0871f518f38ae31437f2f9f93f36f488e1869eaf97dd4697a282d726ce9a292cf4276242733546
-
SSDEEP
384:0ajTrn6tBFCu8OW5x8Yz7x4qTNe730g3ErkdjrNRKJNPqDuqYASKmIWoIVgQrz/L:0ajfEoVOUN2x3ErIrCNPmuVhIW9zf/L
Malware Config
Extracted
xloader
2.5
m5cw
stolpfabriken.com
aromaessentialco.com
rmcclaincpa.com
wuruixin.com
sidhyanticlasses.com
horilka.store
organic-outlaws.com
customsoftwarelogistics.com
cheryltesting.com
thecompacthomegym.com
the22yards.club
quickloanprovidersservices.com
grippyent.com
guard-usa.com
agircredit.com
classificationmetallurgie.com
quizzesandcode.com
catdanos.com
8676789.rest
gotbestshavlngplansforyou.com
supboarddesign.com
byrdemailplans.xyz
anngola.com
milelefoods.com
runawaypklyau.xyz
redesignyourpain.com
yourtv2ship.info
jxypc.com
lerjighjuij.store
spiruline-shop.com
qarziba-therapy.care
hardayumangosteen.com
freevolttech.com
xiongbaosp.xyz
balanzasdeplataforma.com
johnathanmanney.com
estcequecestgreen.com
france-temps-partage.net
fbiicrc.com
privateairjets.com
xn--5m4a23skoc.group
andrewmurnane.com
exitin90.com
depofmvz.com
bosphorus.website
aragon.store
nrnmuhendislik.com
thesharingcorporation.com
tccraft.online
carjabber.com
limitlesschurchbf.com
dazalogistics.com
x-play.club
bitterbay.net
forwardhcd.com
smance.xyz
netgearcloud.net
wellaspiron.com
heidelay.xyz
qknzutohbtro.mobi
epurhybrid.com
pelitupmukaeksklusif.com
secondave.online
lockdownshowdown.online
art-for-a-cause.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2832-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2832-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2344-9-0x0000000000070000-0x0000000000099000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2756 set thread context of 2832 2756 rundll32.exe 32 PID 2832 set thread context of 1188 2832 rundll32.exe 21 PID 2344 set thread context of 1188 2344 cscript.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cscript.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2832 rundll32.exe 2832 rundll32.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe 2344 cscript.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2832 rundll32.exe 2832 rundll32.exe 2832 rundll32.exe 2344 cscript.exe 2344 cscript.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2832 rundll32.exe Token: SeDebugPrivilege 2344 cscript.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2744 wrote to memory of 2756 2744 rundll32.exe 31 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 2756 wrote to memory of 2832 2756 rundll32.exe 32 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 33 PID 1188 wrote to memory of 2344 1188 Explorer.EXE 33 PID 2344 wrote to memory of 2788 2344 cscript.exe 34 PID 2344 wrote to memory of 2788 2344 cscript.exe 34 PID 2344 wrote to memory of 2788 2344 cscript.exe 34 PID 2344 wrote to memory of 2788 2344 cscript.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\ztqv.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2832
-
-
-
-
C:\Windows\SysWOW64\cscript.exe"C:\Windows\SysWOW64\cscript.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2788
-
-