Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-09-2024 14:40
Static task
static1
Behavioral task
behavioral1
Sample
Shipping Document PL&BL Draft.exe
Resource
win7-20240903-en
General
-
Target
Shipping Document PL&BL Draft.exe
-
Size
556KB
-
MD5
b2238c351ed41a67f444ea0c119d957d
-
SHA1
30f944d175c5075240d84662a5b0b3f7ddfbd85f
-
SHA256
f46c3e1152437fbff901cad6cf094298b5e1578a15d204993d715a936e7f501c
-
SHA512
ad67d394f57adc6ec625be5c2f1a678b7a4a247346ea1d7f2e4558bbe23d2c7fff65d1429cc85429661532a45ad90670732149f968ed657629974e7c75b3df1a
-
SSDEEP
12288:FLDMAzjN4YEAFJmOZ76FpC1PTewf//dC:5UOlopoKw3
Malware Config
Extracted
xloader
2.3
c8eo
itsmebecka.com
rinsoku.com
fltcrewcrashpads.com
boostmobiledish.com
contex3.info
beckyhartpcpublishers.com
melsafiltre.net
pyfcw2.com
arctisticwelding.com
rcwrx.com
firesidepoll.net
newpowerconcept.com
makerspharma.com
instantlyfinanciallyfree.com
gourmetgarbage.com
pedegobrewster.com
dysjschool.com
sobue-sc.com
up2drop.com
ejkls.xyz
beaumontclaims.com
vervebydavidlloyd.com
cuyanu.com
anewvisioned.com
summitdyslexia.com
hanafmc.com
ketaminetreatmentcalgary.com
greenclub-dz.com
atlasresearchus.com
banthallafou.info
accbnb.com
institutoclaudiolopes.com
hospiceinkerncounty.com
artwine.net
sandablog.com
burkehishschool.com
graphitetherapy.com
builtinmadisoncounty.com
theimpossiblesessions.com
gymsfam.com
kingoer.com
cpathree.com
powherprojects.net
momopaoyou.com
researchrrr.com
nursechats.com
doorbelldate.net
topfashiondesigns.com
tribalinsurancegroup.com
kck-osaka.com
shikisushifranklin.com
rouxellaimportaciones.com
gloriakam.com
mozuntang.com
smarteryou6g26.club
flexxidesk.com
chinawfkj.com
amazon-accounts-service.com
vaillant-boiler.com
yournewbike.com
boostingoverwatch.com
spicymem.com
reclaimedgolf.com
sagliksuyu.online
collectsit.com
Signatures
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2292-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/2292-19-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/232-24-0x0000000000120000-0x0000000000149000-memory.dmp xloader -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
resource yara_rule behavioral2/memory/4540-6-0x0000000006470000-0x0000000006498000-memory.dmp agile_net -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4540 set thread context of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 2292 set thread context of 3596 2292 Shipping Document PL&BL Draft.exe 56 PID 232 set thread context of 3596 232 help.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Shipping Document PL&BL Draft.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language help.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
System Network Configuration Discovery: Internet Connection Discovery 1 TTPs 3 IoCs
Adversaries may check for Internet connectivity on compromised systems.
pid Process 2292 Shipping Document PL&BL Draft.exe 1396 cmd.exe 4540 Shipping Document PL&BL Draft.exe -
Suspicious behavior: EnumeratesProcesses 51 IoCs
pid Process 4540 Shipping Document PL&BL Draft.exe 4540 Shipping Document PL&BL Draft.exe 4540 Shipping Document PL&BL Draft.exe 2292 Shipping Document PL&BL Draft.exe 2292 Shipping Document PL&BL Draft.exe 2292 Shipping Document PL&BL Draft.exe 2292 Shipping Document PL&BL Draft.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe 232 help.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2292 Shipping Document PL&BL Draft.exe 2292 Shipping Document PL&BL Draft.exe 2292 Shipping Document PL&BL Draft.exe 232 help.exe 232 help.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4540 Shipping Document PL&BL Draft.exe Token: SeDebugPrivilege 2292 Shipping Document PL&BL Draft.exe Token: SeDebugPrivilege 232 help.exe Token: SeShutdownPrivilege 3596 Explorer.EXE Token: SeCreatePagefilePrivilege 3596 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4540 wrote to memory of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 4540 wrote to memory of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 4540 wrote to memory of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 4540 wrote to memory of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 4540 wrote to memory of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 4540 wrote to memory of 2292 4540 Shipping Document PL&BL Draft.exe 98 PID 3596 wrote to memory of 232 3596 Explorer.EXE 99 PID 3596 wrote to memory of 232 3596 Explorer.EXE 99 PID 3596 wrote to memory of 232 3596 Explorer.EXE 99 PID 232 wrote to memory of 1396 232 help.exe 101 PID 232 wrote to memory of 1396 232 help.exe 101 PID 232 wrote to memory of 1396 232 help.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3596 -
C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"3⤵
- Suspicious use of SetThreadContext
- System Network Configuration Discovery: Internet Connection Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2292
-
-
-
C:\Windows\SysWOW64\help.exe"C:\Windows\SysWOW64\help.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Shipping Document PL&BL Draft.exe"3⤵
- System Location Discovery: System Language Discovery
- System Network Configuration Discovery: Internet Connection Discovery
PID:1396
-
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4080,i,16316361669272684588,6171287487746154806,262144 --variations-seed-version --mojo-platform-channel-handle=4076 /prefetch:81⤵PID:4316