Analysis
-
max time kernel
147s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-09-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Document PL&BL Draft.exe
Resource
win7-20240903-en
General
-
Target
Shipping Document PL&BL Draft.exe
-
Size
556KB
-
MD5
b2238c351ed41a67f444ea0c119d957d
-
SHA1
30f944d175c5075240d84662a5b0b3f7ddfbd85f
-
SHA256
f46c3e1152437fbff901cad6cf094298b5e1578a15d204993d715a936e7f501c
-
SHA512
ad67d394f57adc6ec625be5c2f1a678b7a4a247346ea1d7f2e4558bbe23d2c7fff65d1429cc85429661532a45ad90670732149f968ed657629974e7c75b3df1a
-
SSDEEP
12288:FLDMAzjN4YEAFJmOZ76FpC1PTewf//dC:5UOlopoKw3
Malware Config
Extracted
xloader
2.3
c8eo
itsmebecka.com
rinsoku.com
fltcrewcrashpads.com
boostmobiledish.com
contex3.info
beckyhartpcpublishers.com
melsafiltre.net
pyfcw2.com
arctisticwelding.com
rcwrx.com
firesidepoll.net
newpowerconcept.com
makerspharma.com
instantlyfinanciallyfree.com
gourmetgarbage.com
pedegobrewster.com
dysjschool.com
sobue-sc.com
up2drop.com
ejkls.xyz
beaumontclaims.com
vervebydavidlloyd.com
cuyanu.com
anewvisioned.com
summitdyslexia.com
hanafmc.com
ketaminetreatmentcalgary.com
greenclub-dz.com
atlasresearchus.com
banthallafou.info
accbnb.com
institutoclaudiolopes.com
hospiceinkerncounty.com
artwine.net
sandablog.com
burkehishschool.com
graphitetherapy.com
builtinmadisoncounty.com
theimpossiblesessions.com
gymsfam.com
kingoer.com
cpathree.com
powherprojects.net
momopaoyou.com
researchrrr.com
nursechats.com
doorbelldate.net
topfashiondesigns.com
tribalinsurancegroup.com
kck-osaka.com
shikisushifranklin.com
rouxellaimportaciones.com
gloriakam.com
mozuntang.com
smarteryou6g26.club
flexxidesk.com
chinawfkj.com
amazon-accounts-service.com
vaillant-boiler.com
yournewbike.com
boostingoverwatch.com
spicymem.com
reclaimedgolf.com
sagliksuyu.online
collectsit.com
Signatures
-
Xloader payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/880-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/880-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1800-22-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 2716 cmd.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/2384-3-0x00000000056A0000-0x00000000056C8000-memory.dmp agile_net -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Shipping Document PL&BL Draft.exeShipping Document PL&BL Draft.exechkdsk.exedescription pid process target process PID 2384 set thread context of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 880 set thread context of 1192 880 Shipping Document PL&BL Draft.exe Explorer.EXE PID 1800 set thread context of 1192 1800 chkdsk.exe Explorer.EXE -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Shipping Document PL&BL Draft.exechkdsk.execmd.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipping Document PL&BL Draft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language chkdsk.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
Processes:
Shipping Document PL&BL Draft.exeShipping Document PL&BL Draft.execmd.exepid process 2384 Shipping Document PL&BL Draft.exe 880 Shipping Document PL&BL Draft.exe 2716 cmd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
Shipping Document PL&BL Draft.exeShipping Document PL&BL Draft.exechkdsk.exepid process 2384 Shipping Document PL&BL Draft.exe 2384 Shipping Document PL&BL Draft.exe 880 Shipping Document PL&BL Draft.exe 880 Shipping Document PL&BL Draft.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe 1800 chkdsk.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Shipping Document PL&BL Draft.exechkdsk.exepid process 880 Shipping Document PL&BL Draft.exe 880 Shipping Document PL&BL Draft.exe 880 Shipping Document PL&BL Draft.exe 1800 chkdsk.exe 1800 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Shipping Document PL&BL Draft.exeShipping Document PL&BL Draft.exechkdsk.exedescription pid process Token: SeDebugPrivilege 2384 Shipping Document PL&BL Draft.exe Token: SeDebugPrivilege 880 Shipping Document PL&BL Draft.exe Token: SeDebugPrivilege 1800 chkdsk.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
Shipping Document PL&BL Draft.exeExplorer.EXEchkdsk.exedescription pid process target process PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 2384 wrote to memory of 880 2384 Shipping Document PL&BL Draft.exe Shipping Document PL&BL Draft.exe PID 1192 wrote to memory of 1800 1192 Explorer.EXE chkdsk.exe PID 1192 wrote to memory of 1800 1192 Explorer.EXE chkdsk.exe PID 1192 wrote to memory of 1800 1192 Explorer.EXE chkdsk.exe PID 1192 wrote to memory of 1800 1192 Explorer.EXE chkdsk.exe PID 1800 wrote to memory of 2716 1800 chkdsk.exe cmd.exe PID 1800 wrote to memory of 2716 1800 chkdsk.exe cmd.exe PID 1800 wrote to memory of 2716 1800 chkdsk.exe cmd.exe PID 1800 wrote to memory of 2716 1800 chkdsk.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1192 -
C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"3⤵
- Suspicious use of SetThreadContext
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:880
-
-
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:2716
-
-