Overview
overview
10Static
static
10Exloader/7zxa.dll
windows7-x64
1Exloader/7zxa.dll
windows10-2004-x64
1Exloader/D...it.dll
windows7-x64
1Exloader/D...it.dll
windows10-2004-x64
1Exloader/D...rs.dll
windows7-x64
1Exloader/D...rs.dll
windows10-2004-x64
1Exloader/RarExt.dll
windows7-x64
3Exloader/RarExt.dll
windows10-2004-x64
3Exloader/e...v3.exe
windows7-x64
10Exloader/e...v3.exe
windows10-2004-x64
10Exloader/p...rm.dll
windows7-x64
1Exloader/p...rm.dll
windows10-2004-x64
1Analysis
-
max time kernel
93s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 21:25
Behavioral task
behavioral1
Sample
Exloader/7zxa.dll
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
Exloader/7zxa.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Exloader/Data/MimeKit.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
Exloader/Data/MimeKit.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Exloader/Data/System.Buffers.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Exloader/Data/System.Buffers.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
Exloader/RarExt.dll
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
Exloader/RarExt.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
Exloader/exland_setup_v3.exe
Resource
win7-20240708-en
Behavioral task
behavioral10
Sample
Exloader/exland_setup_v3.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
Exloader/psmachine_arm.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
Exloader/psmachine_arm.dll
Resource
win10v2004-20241007-en
General
-
Target
Exloader/RarExt.dll
-
Size
2.4MB
-
MD5
ed48227dc6b9d864a143860aabf7a6a0
-
SHA1
e1006e30d3b46fc3653670b87c9288345442bdd6
-
SHA256
ca28db0c93c75fb5c010e1ec2a49f52bd823665db41a4d1a5ff35a0e9c3837a3
-
SHA512
d8b7375cad136a92c646f1e30a1777fab2ff3f1af83b514e5a98e759303b11ba9b688d62c7688faa99798cb84f7a68386dbc034ae446896e4be9892b00fb2ed2
-
SSDEEP
49152:rtmNUM5ex9duVqpy2suVH9BAzvWF4i1TxWLcOGTGS4gYe:rIJebHbAzv1Iz
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4196 wrote to memory of 1148 4196 rundll32.exe 82 PID 4196 wrote to memory of 1148 4196 rundll32.exe 82 PID 4196 wrote to memory of 1148 4196 rundll32.exe 82
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Exloader\RarExt.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4196 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Exloader\RarExt.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:1148
-