Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04-11-2024 06:57
Static task
static1
Behavioral task
behavioral1
Sample
DHL EXPRESS.exe
Resource
win7-20240903-en
General
-
Target
DHL EXPRESS.exe
-
Size
1.1MB
-
MD5
a4f882b8dfb6c075effcaf592d5662f8
-
SHA1
c3b5d0b630a8575304fdcc92023fb5b3c051c1b4
-
SHA256
999793a77939720fd339a4a06bfb8af07523f433009b1895b8dec743d4026008
-
SHA512
5780b1cdf63db3826fba5dfc0defa7672dab46782c693e1f7f629e3a3cfb13708d36d9e61872761eadfa554c3e553df28003862dc04dc8f6472fc5494965cad5
-
SSDEEP
24576:dAHnh+eWsN3skA4RV1Hom2KXFmIan9tlBtuWBd88PBE5:8h+ZkldoPK1Xan/jwWlQ
Malware Config
Extracted
xworm
5.0
195.154.49.246:2080
Wxez4wHXX8E21z87
-
install_file
USB.exe
Signatures
-
Detect Xworm Payload 1 IoCs
resource yara_rule behavioral2/memory/4044-31-0x0000000000400000-0x0000000000410000-memory.dmp family_xworm -
Xworm family
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\cunila.vbs cunila.exe -
Executes dropped EXE 1 IoCs
pid Process 1272 cunila.exe -
AutoIT Executable 1 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x0007000000023caa-14.dat autoit_exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1272 set thread context of 4044 1272 cunila.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL EXPRESS.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cunila.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegSvcs.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4044 RegSvcs.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 1272 cunila.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 4044 RegSvcs.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4044 RegSvcs.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2864 wrote to memory of 1272 2864 DHL EXPRESS.exe 87 PID 2864 wrote to memory of 1272 2864 DHL EXPRESS.exe 87 PID 2864 wrote to memory of 1272 2864 DHL EXPRESS.exe 87 PID 1272 wrote to memory of 4044 1272 cunila.exe 88 PID 1272 wrote to memory of 4044 1272 cunila.exe 88 PID 1272 wrote to memory of 4044 1272 cunila.exe 88 PID 1272 wrote to memory of 4044 1272 cunila.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS.exe"C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\holloing\cunila.exe"C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS.exe"2⤵
- Drops startup file
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1272 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Users\Admin\AppData\Local\Temp\DHL EXPRESS.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:4044
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
36KB
MD55635ad00e748a47bff8330822c030ebf
SHA1e3504f02b4d6cb5afcc9f051a7cdd17902286ca2
SHA256549998b23bcd05105a8e8662510fa04a92014bd36e9dc568a6c3e0d11e199ebf
SHA512944bdfb02d5f308e0ebe30ab98e3dd359c622dd7b786155091db4516cb9f9f64dcbe89b1cdba9d464abce5b6260e9ce4f14b1c5a10b46cba672ec3263d677166
-
Filesize
140KB
MD5ac11d25107b0285906b7fe88df5f3c1d
SHA1b7a27996f2d8ae79d7e16d4ba6d57f3ec3e2f1f4
SHA256a222226b607a17e13966e4ff388f4904d4c22f528fb0d043d1df84f0d9c88b72
SHA512a2d16b18579da36ad682a3dc711ea33f5bbd967b8e62f7a872ea5e5470643199c2b9467f4c02cae391b8b0d6d330f21ba56a1575ff49adc62bfef547378ad73b
-
Filesize
1.1MB
MD5a4f882b8dfb6c075effcaf592d5662f8
SHA1c3b5d0b630a8575304fdcc92023fb5b3c051c1b4
SHA256999793a77939720fd339a4a06bfb8af07523f433009b1895b8dec743d4026008
SHA5125780b1cdf63db3826fba5dfc0defa7672dab46782c693e1f7f629e3a3cfb13708d36d9e61872761eadfa554c3e553df28003862dc04dc8f6472fc5494965cad5