Analysis
-
max time kernel
152s -
max time network
151s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
26-01-2022 14:26
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shipment Doc.exe
Resource
win7-en-20211208
General
-
Target
DHL Shipment Doc.exe
-
Size
817KB
-
MD5
53af702f438bffc2adb85ae9f5b8c879
-
SHA1
e6aae502e5ea273f1367efd874bf44745d409549
-
SHA256
95ebd87f0d2e1ef1fdbf4e35290a0e9deb65b021acf657e396e960142e80eedb
-
SHA512
4e67eaaff0c8c2297b2f31040debf32b74048aa7deb8bb9498368d19966108400c12592b55e0a29bd173271b6b8d120fac5b2d1096cf318cf7edcba1527e1283
Malware Config
Extracted
xloader
2.5
how6
wealthcabana.com
fourfortyfourcreations.com
cqqcsy.com
bhwzjd.com
niftyfashionrewards.com
andersongiftemporium.com
smarttradingcoin.com
ilarealty.com
sherrywine.net
fsecg.info
xoti.top
pirosconsulting.com
fundapie.com
bbgm4egda.xyz
legalfortmyers.com
improvizy.com
yxdyhs.com
lucky2balls.com
panelmall.com
davenportkartway.com
springfieldlottery.com
pentagonpublishers.com
icanmakeyoufamous.com
40m2k.com
projectcentered.com
webfactory.agency
metronixmedical.com
dalingtao.xyz
functionalsoft.com
klopert77.com
cortepuroiberico.com
viavelleiloes.online
bamedia.online
skolicalunjo.com
kayhardy.com
excellentappraisers.com
sademakale.com
zbycsb.com
empirejewelss.com
coached.info
20215414.online
dazzlehide.com
swickstyle.com
specialtyplastics.online
noordinarysenior.com
bluinfo.digital
chuxiaoxin.xyz
adwin-estate.com
girlwithaglow.com
auctions.email
topekasecurestorage.com
mountain-chicken.com
lhdtrj.com
mhtqph.club
solatopotato.com
mecitiris.com
hotrodathangtrungquoc.com
gapteknews.com
mantraexchange.online
cinematiccarpenter.com
wozka.xyz
car-tech.tech
jssatchell.media
joyokanji-cheer.com
floridanratraining.com
Signatures
-
Xloader Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/696-61-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/696-66-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/680-72-0x0000000000090000-0x00000000000B9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1488 cmd.exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
DHL Shipment Doc.exeDHL Shipment Doc.exemsiexec.exedescription pid process target process PID 1724 set thread context of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 696 set thread context of 1408 696 DHL Shipment Doc.exe Explorer.EXE PID 696 set thread context of 1408 696 DHL Shipment Doc.exe Explorer.EXE PID 680 set thread context of 1408 680 msiexec.exe Explorer.EXE -
Suspicious behavior: EnumeratesProcesses 20 IoCs
Processes:
DHL Shipment Doc.exemsiexec.exepid process 696 DHL Shipment Doc.exe 696 DHL Shipment Doc.exe 696 DHL Shipment Doc.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe 680 msiexec.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
DHL Shipment Doc.exemsiexec.exepid process 696 DHL Shipment Doc.exe 696 DHL Shipment Doc.exe 696 DHL Shipment Doc.exe 696 DHL Shipment Doc.exe 680 msiexec.exe 680 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DHL Shipment Doc.exemsiexec.exedescription pid process Token: SeDebugPrivilege 696 DHL Shipment Doc.exe Token: SeDebugPrivilege 680 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1408 Explorer.EXE 1408 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1408 Explorer.EXE 1408 Explorer.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
DHL Shipment Doc.exeExplorer.EXEmsiexec.exedescription pid process target process PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1724 wrote to memory of 696 1724 DHL Shipment Doc.exe DHL Shipment Doc.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 1408 wrote to memory of 680 1408 Explorer.EXE msiexec.exe PID 680 wrote to memory of 1488 680 msiexec.exe cmd.exe PID 680 wrote to memory of 1488 680 msiexec.exe cmd.exe PID 680 wrote to memory of 1488 680 msiexec.exe cmd.exe PID 680 wrote to memory of 1488 680 msiexec.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DHL Shipment Doc.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shipment Doc.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\DHL Shipment Doc.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shipment Doc.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\msiexec.exe"C:\Windows\SysWOW64\msiexec.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Shipment Doc.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/680-70-0x0000000000130000-0x0000000000144000-memory.dmpFilesize
80KB
-
memory/680-73-0x0000000002350000-0x00000000023E0000-memory.dmpFilesize
576KB
-
memory/680-71-0x0000000002040000-0x0000000002343000-memory.dmpFilesize
3.0MB
-
memory/680-72-0x0000000000090000-0x00000000000B9000-memory.dmpFilesize
164KB
-
memory/696-67-0x0000000000390000-0x00000000003A1000-memory.dmpFilesize
68KB
-
memory/696-66-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/696-60-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/696-61-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/696-63-0x0000000000820000-0x0000000000B23000-memory.dmpFilesize
3.0MB
-
memory/696-64-0x0000000000200000-0x0000000000211000-memory.dmpFilesize
68KB
-
memory/696-59-0x0000000000400000-0x0000000000429000-memory.dmpFilesize
164KB
-
memory/1408-65-0x0000000006A40000-0x0000000006B8A000-memory.dmpFilesize
1.3MB
-
memory/1408-68-0x00000000072C0000-0x00000000073F4000-memory.dmpFilesize
1.2MB
-
memory/1408-74-0x0000000003B10000-0x0000000003BA3000-memory.dmpFilesize
588KB
-
memory/1724-54-0x00000000011A0000-0x0000000001274000-memory.dmpFilesize
848KB
-
memory/1724-58-0x0000000004950000-0x00000000049B2000-memory.dmpFilesize
392KB
-
memory/1724-57-0x00000000003A0000-0x00000000003AC000-memory.dmpFilesize
48KB
-
memory/1724-56-0x0000000004E90000-0x0000000004E91000-memory.dmpFilesize
4KB
-
memory/1724-55-0x0000000076C91000-0x0000000076C93000-memory.dmpFilesize
8KB