Analysis
-
max time kernel
146s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
10-01-2025 21:48
Static task
static1
Behavioral task
behavioral1
Sample
JaffaCakes118_ef243115db5fd87673b93a350bfc68f4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
JaffaCakes118_ef243115db5fd87673b93a350bfc68f4.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/mtpoerkl.dll
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/mtpoerkl.dll
Resource
win10v2004-20241007-en
General
-
Target
$PLUGINSDIR/mtpoerkl.dll
-
Size
20KB
-
MD5
adc8b564ab49cf22c95760ca373e51ce
-
SHA1
ce0bb7c028a41868e1c2003710c386d84d1b0563
-
SHA256
5e074e10a889e3790c6fe2bd7131f3e990e234dd64e30feb812ef32441351e48
-
SHA512
f0f4251868231f9f693be855410cf559ea5b5f687c4d9f6651fbd39e01690de6e57db9ab6023e53d909efc3154ead6a7daefe8a65f3e39aa02b991cf6c5feef3
-
SSDEEP
192:9dBwHlinVnbk4ia/6n3lfNIgJ2PIXyY8gu0tR0buCGfibI6sKOwS5iMrOVI2qFOE:P+FiVbkftNIgoU8oCioKKOw1PDqFjh
Malware Config
Extracted
xloader
2.5
ga6b
diasporacospices.com
sd-shenghe.com
onlinewritingjobs.net
greenstreamgroup.store
garageair.agency
idh-bf.com
middenhavendambreskens.com
szkoleniawcag.online
wiremefeelings.com
ottosperformance.com
brothermush.com
weiserpath.com
baohiemtv24h.com
glassgalaxynft.com
spiritualmind.space
18130072012.com
3v0.space
smartgadgetscompare.com
corvusexpeditii.xyz
egcontabilidade.website
find0utnowfy.info
soulwinningministry.com
digitaldreamcloud.net
service-portal-kundendaten.com
theselectdifference.com
burodev.com
mustafacesuryildiz.com
grupodeinvestigacion.com
toyotadisurabaya.com
partnerbenifits.com
belledescontos.com
nobodybutgod.com
bumiths.com
acacave.com
septoctets.xyz
www73w.xyz
afghantattoos.com
interiorsbe.com
ara7z.com
qqcx666888.top
onra.top
sunfucker.net
suhuabo.com
tangerineinit.com
era636.com
lovenft.xyz
maviesurdvd.com
gullatz-consulting.com
duopasteleras.com
mystudentregistration.com
5559913.win
gritzcharlestonluxuryinn.store
themexicanbg.com
senshop.store
woodentoysforkids.store
globalgamelan.com
anjumanmuhibaneabbas.com
seattleinsurancebrokers.com
naiduteja049.info
traction.legal
twisteid.com
necesryaou.com
apan-group.com
infinityrope.store
egyptian-museum.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral3/memory/2168-1-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2168-4-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral3/memory/2084-10-0x0000000000080000-0x00000000000A9000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2412 set thread context of 2168 2412 rundll32.exe 31 PID 2168 set thread context of 1244 2168 rundll32.exe 21 PID 2084 set thread context of 1244 2084 control.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language control.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2168 rundll32.exe 2168 rundll32.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe 2084 control.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2168 rundll32.exe 2168 rundll32.exe 2168 rundll32.exe 2084 control.exe 2084 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2168 rundll32.exe Token: SeDebugPrivilege 2084 control.exe -
Suspicious use of WriteProcessMemory 25 IoCs
description pid Process procid_target PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2108 wrote to memory of 2412 2108 rundll32.exe 30 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 2412 wrote to memory of 2168 2412 rundll32.exe 31 PID 1244 wrote to memory of 2084 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2084 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2084 1244 Explorer.EXE 32 PID 1244 wrote to memory of 2084 1244 Explorer.EXE 32 PID 2084 wrote to memory of 2936 2084 control.exe 33 PID 2084 wrote to memory of 2936 2084 control.exe 33 PID 2084 wrote to memory of 2936 2084 control.exe 33 PID 2084 wrote to memory of 2936 2084 control.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mtpoerkl.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mtpoerkl.dll,#13⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\mtpoerkl.dll,#14⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2168
-
-
-
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Windows\SysWOW64\rundll32.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2936
-
-