Analysis
-
max time kernel
146s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 08:10
Static task
static1
Behavioral task
behavioral1
Sample
DHL Shipment Notification 7465649870,pdf.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
DHL Shipment Notification 7465649870,pdf.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240705-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
wglt35.dll
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
wglt35.dll
Resource
win10v2004-20240802-en
General
-
Target
DHL Shipment Notification 7465649870,pdf.exe
-
Size
475KB
-
MD5
5f1d6d2674dd4d2de6e5bbd27bdfcce6
-
SHA1
74ea9789225daacd9bfae0cf78a3715208a00279
-
SHA256
1432f0240c91b7439722df807e35ef9b4cc9b126f3e5d42cedb27b28751118d7
-
SHA512
ff0553626ab89069a2453fe569573567e2208a6adf0a24b013bcee26b27ac392663eb47d89698611a93259543ada83d9870b3de06ce7d3631d47f7269f0c90e5
-
SSDEEP
12288:lZvaNpUD1OLUeUTc4DaZ2jABsoI8IGBS3u:uUz82jALnNCu
Malware Config
Extracted
xloader
2.3
cna8
exceptionalhospital.com
agshorizon.com
sabaisurfing.com
kathrynprosser.com
news-roma.com
lareinadelosalisados.com
iregretnotcomingupwithit.com
dreamwrldrp.com
brickhallschool-ng.com
exgobal.com
ojcllc.com
pineviewsunrise.com
ru-joking.com
theparkplasticsurgery.com
mouthsecond.today
princessmasksandapparel.com
onlinedavetiyecim.com
animegirls.xyz
heicat.club
brazillianallstars.com
evlvacations.com
loveworldjerusalem.com
u9wm4u5fssmaj.net
diamondmobiledetailingmo.com
christlicheliebe.net
bemeximus.com
resellerpagecomputers.com
bexbakingcompany.com
trytagawy.com
consentidomusic.com
hauntedthing.com
taoranzz.com
saiparahnama.com
eiz.one
advokatpengacara.com
rapidocoin.net
okbabe.site
cursoexitus.com
zbjingrui.com
diy-and-home-improvementt.com
triaggdesign.com
theplushtoothbrush.com
cowbex.info
outhomenow.com
dietas-medicas.com
czpeixun.com
interlingue.info
18tshortstore.com
jubilee21.com
5725carnarvon.com
sussexnutritionist.com
flyonit.network
ouhaiwutian.com
thebombshellcomics.com
loc7v7.com
san-andreas.online
oilyusa.com
starsandspices.com
goldenpictureszambia.com
cozdat.site
hyderabadmanhattancondos.com
svsnovotec.com
larray.com
wesharefiles.com
oeayzom.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/2464-12-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2464-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2728-21-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid Process 2816 cmd.exe -
Loads dropped DLL 2 IoCs
Processes:
DHL Shipment Notification 7465649870,pdf.exepid Process 1688 DHL Shipment Notification 7465649870,pdf.exe 1688 DHL Shipment Notification 7465649870,pdf.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
DHL Shipment Notification 7465649870,pdf.exeDHL Shipment Notification 7465649870,pdf.execmmon32.exedescription pid Process procid_target PID 1688 set thread context of 2464 1688 DHL Shipment Notification 7465649870,pdf.exe 31 PID 2464 set thread context of 1216 2464 DHL Shipment Notification 7465649870,pdf.exe 21 PID 2728 set thread context of 1216 2728 cmmon32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
DHL Shipment Notification 7465649870,pdf.execmmon32.execmd.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL Shipment Notification 7465649870,pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 33 IoCs
Processes:
DHL Shipment Notification 7465649870,pdf.exeDHL Shipment Notification 7465649870,pdf.execmmon32.exepid Process 1688 DHL Shipment Notification 7465649870,pdf.exe 1688 DHL Shipment Notification 7465649870,pdf.exe 1688 DHL Shipment Notification 7465649870,pdf.exe 1688 DHL Shipment Notification 7465649870,pdf.exe 2464 DHL Shipment Notification 7465649870,pdf.exe 2464 DHL Shipment Notification 7465649870,pdf.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe 2728 cmmon32.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
DHL Shipment Notification 7465649870,pdf.exeDHL Shipment Notification 7465649870,pdf.execmmon32.exepid Process 1688 DHL Shipment Notification 7465649870,pdf.exe 2464 DHL Shipment Notification 7465649870,pdf.exe 2464 DHL Shipment Notification 7465649870,pdf.exe 2464 DHL Shipment Notification 7465649870,pdf.exe 2728 cmmon32.exe 2728 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
DHL Shipment Notification 7465649870,pdf.execmmon32.exedescription pid Process Token: SeDebugPrivilege 2464 DHL Shipment Notification 7465649870,pdf.exe Token: SeDebugPrivilege 2728 cmmon32.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
DHL Shipment Notification 7465649870,pdf.exeExplorer.EXEcmmon32.exedescription pid Process procid_target PID 1688 wrote to memory of 2464 1688 DHL Shipment Notification 7465649870,pdf.exe 31 PID 1688 wrote to memory of 2464 1688 DHL Shipment Notification 7465649870,pdf.exe 31 PID 1688 wrote to memory of 2464 1688 DHL Shipment Notification 7465649870,pdf.exe 31 PID 1688 wrote to memory of 2464 1688 DHL Shipment Notification 7465649870,pdf.exe 31 PID 1688 wrote to memory of 2464 1688 DHL Shipment Notification 7465649870,pdf.exe 31 PID 1216 wrote to memory of 2728 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2728 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2728 1216 Explorer.EXE 32 PID 1216 wrote to memory of 2728 1216 Explorer.EXE 32 PID 2728 wrote to memory of 2816 2728 cmmon32.exe 33 PID 2728 wrote to memory of 2816 2728 cmmon32.exe 33 PID 2728 wrote to memory of 2816 2728 cmmon32.exe 33 PID 2728 wrote to memory of 2816 2728 cmmon32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 7465649870,pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 7465649870,pdf.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 7465649870,pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 7465649870,pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2464
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL Shipment Notification 7465649870,pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2816
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11KB
MD5fccff8cb7a1067e23fd2e2b63971a8e1
SHA130e2a9e137c1223a78a0f7b0bf96a1c361976d91
SHA2566fcea34c8666b06368379c6c402b5321202c11b00889401c743fb96c516c679e
SHA512f4335e84e6f8d70e462a22f1c93d2998673a7616c868177cac3e8784a3be1d7d0bb96f2583fa0ed82f4f2b6b8f5d9b33521c279a42e055d80a94b4f3f1791e0c
-
Filesize
11KB
MD5a3fac60a80360e4b8405e49b94a4206b
SHA149da0493c583df26b7b2451f53b714e26e59094a
SHA256c2cbeefaec2af891287a8bdefbec66c008f34825c339ec3d371b4752f0e2f86b
SHA5122ba81804ae06204356e9aee462dea7b83601b71069e44b0395037c77750cc6a0cde832faf061b46a1ef75837cb47e5be8499c35a281810a2b992b8dc561bfbe1