Overview
overview
10Static
static
3IoC/00496083.xls
windows7-x64
3IoC/00496083.xls
windows10-2004-x64
1IoC/680589798891.xls
windows7-x64
3IoC/680589798891.xls
windows10-2004-x64
1Consignmen...df.exe
windows7-x64
10Consignmen...df.exe
windows10-2004-x64
10DHL SHIPME...PD.exe
windows7-x64
10DHL SHIPME...PD.exe
windows10-2004-x64
10EZ0496.exe
windows7-x64
10EZ0496.exe
windows10-2004-x64
10IoC/I05517...55.xls
windows7-x64
3IoC/I05517...55.xls
windows10-2004-x64
1IoC/I79540...11.xls
windows7-x64
3IoC/I79540...11.xls
windows10-2004-x64
1New Order ...22.exe
windows7-x64
10New Order ...22.exe
windows10-2004-x64
10$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Windows.Sy...ns.dll
windows10-2004-x64
3systeminfo.exe
windows10-2004-x64
3wecutil.exe
windows10-2004-x64
3New order ...22.exe
windows7-x64
10New order ...22.exe
windows10-2004-x64
10PO_#YBIC38...py.exe
windows7-x64
3PO_#YBIC38...py.exe
windows10-2004-x64
3Payment Ad...2).exe
windows7-x64
10Payment Ad...2).exe
windows10-2004-x64
10IoC/XSG8996380.xls
windows7-x64
3IoC/XSG8996380.xls
windows10-2004-x64
1Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:24
Static task
static1
Behavioral task
behavioral1
Sample
IoC/00496083.xls
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
IoC/00496083.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IoC/680589798891.xls
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
IoC/680589798891.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Consignment Document.pdf.exe
Resource
win7-20240903-en
Behavioral task
behavioral6
Sample
Consignment Document.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DHL SHIPMENT NOTIFICATION 284748395PD.exe
Resource
win7-20241010-en
Behavioral task
behavioral8
Sample
DHL SHIPMENT NOTIFICATION 284748395PD.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
EZ0496.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
EZ0496.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
IoC/I055170_06975755.xls
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
IoC/I055170_06975755.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
IoC/I795405_33242211.xls
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
IoC/I795405_33242211.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
New Order 00027748585 02222022.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
New Order 00027748585 02222022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Windows.System.Diagnostics.TraceReporting.PlatformDiagnosticActions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
systeminfo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
wecutil.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
New order 003848848575 02162022.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
New order 003848848575 02162022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
PO_#YBIC3892900183902328_Evaluated Copy.exe
Resource
win7-20240903-en
Behavioral task
behavioral27
Sample
PO_#YBIC3892900183902328_Evaluated Copy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Payment Advice for Outstanding Invoices (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
Payment Advice for Outstanding Invoices (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
IoC/XSG8996380.xls
Resource
win7-20240729-en
Behavioral task
behavioral31
Sample
IoC/XSG8996380.xls
Resource
win10v2004-20241007-en
General
-
Target
Payment Advice for Outstanding Invoices (2).exe
-
Size
621KB
-
MD5
2a2d3e7c62d3b3a9e9ef3565f04a2dc5
-
SHA1
e4829cc9645d8c2a26929d2f132cf6d0f358a988
-
SHA256
c435fcfb3786d573ede77e30ded01503640a4de64523df7e9078cfc572381ced
-
SHA512
0226f28426976c5bd064caabea3645062a99e1b1e99e79e4d518c783e208b299534ea9a4d1180bc43651fb1b65f72440382910b7ddf30e57ee4b8c9c9a732871
-
SSDEEP
12288:7Zbr8K777777777777TkNdgOG0IzkXh7aolFyiSu61xdEJXouOo0XSLEdigeAaui:7F8K777777777777TiP8EFhmoMst
Malware Config
Extracted
xloader
2.5
nqni
lekitaly.com
heroteas.com
funtique.art
cedarmoonshop.com
greenozon.com
jonescompanysolutions.com
pdxls.com
icreateandcut.com
healthylifeagainnow.com
zhongxinzxpz.top
hotelsaskatchewan.info
louisebeckinsale.net
hivizpeople.com
sanjoseejidillo.com
turnspout.net
suddennnnnnnnnnnn02.xyz
annianzu.icu
webdesigncharlestonsc.com
headrank.agency
bradyiconmusiccenter.com
bestemdurano.quest
mkbau-quickborn.com
telesportsbetting.com
zvedaventeco.quest
paradgmpharma.com
sarrosh.com
archivoibagon.xyz
alhelicanas.com
dazalogistics.com
timeless-express.com
otelcollector.com
marfez.net
kulturacosmetics.com
dbcvj.com
miracleinrecovery.com
palmsugar.biz
ingenuitygs.com
footprintorg.com
niceauto.mobi
tenlog001.xyz
visionaryentertainmentllc.com
vidasaludabledesdecasa.com
moreosin.com
hyggealewee.quest
cacaolixir.com
gowamerica.com
wynningforyou.com
kopekgiysileri.xyz
londcwtoyof6.xyz
knowunknow.com
senegencehr.com
desovote.com
724ototamir.com
ktnword.xyz
suaveluna.com
prowebcraft.net
h2waj537c697.biz
awesomeappsmusicdownloader.top
thebougiebrandshop.com
fullarchsuccess.com
supremepeakmaleenhancement.com
estabuloburgers.com
729321.com
avaxbridgeapes.com
apollorealtors.com
Signatures
-
Xloader family
-
Xloader payload 4 IoCs
Processes:
resource yara_rule behavioral29/memory/4072-15-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral29/memory/4072-20-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral29/memory/4072-24-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral29/memory/756-31-0x0000000001250000-0x0000000001279000-memory.dmp xloader -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
Payment Advice for Outstanding Invoices (2).exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\International\Geo\Nation Payment Advice for Outstanding Invoices (2).exe -
Suspicious use of SetThreadContext 4 IoCs
Processes:
Payment Advice for Outstanding Invoices (2).exePayment Advice for Outstanding Invoices (2).exeexplorer.exedescription pid process target process PID 4988 set thread context of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 4072 set thread context of 3508 4072 Payment Advice for Outstanding Invoices (2).exe Explorer.EXE PID 4072 set thread context of 3508 4072 Payment Advice for Outstanding Invoices (2).exe Explorer.EXE PID 756 set thread context of 3508 756 explorer.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Payment Advice for Outstanding Invoices (2).exeschtasks.exeexplorer.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Advice for Outstanding Invoices (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language explorer.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 51 IoCs
Processes:
Payment Advice for Outstanding Invoices (2).exePayment Advice for Outstanding Invoices (2).exeexplorer.exepid process 4988 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe 756 explorer.exe -
Suspicious behavior: MapViewOfSection 6 IoCs
Processes:
Payment Advice for Outstanding Invoices (2).exeexplorer.exepid process 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 4072 Payment Advice for Outstanding Invoices (2).exe 756 explorer.exe 756 explorer.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Payment Advice for Outstanding Invoices (2).exePayment Advice for Outstanding Invoices (2).exeexplorer.exedescription pid process Token: SeDebugPrivilege 4988 Payment Advice for Outstanding Invoices (2).exe Token: SeDebugPrivilege 4072 Payment Advice for Outstanding Invoices (2).exe Token: SeDebugPrivilege 756 explorer.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Payment Advice for Outstanding Invoices (2).exeExplorer.EXEdescription pid process target process PID 4988 wrote to memory of 2840 4988 Payment Advice for Outstanding Invoices (2).exe schtasks.exe PID 4988 wrote to memory of 2840 4988 Payment Advice for Outstanding Invoices (2).exe schtasks.exe PID 4988 wrote to memory of 2840 4988 Payment Advice for Outstanding Invoices (2).exe schtasks.exe PID 4988 wrote to memory of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 4988 wrote to memory of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 4988 wrote to memory of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 4988 wrote to memory of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 4988 wrote to memory of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 4988 wrote to memory of 4072 4988 Payment Advice for Outstanding Invoices (2).exe Payment Advice for Outstanding Invoices (2).exe PID 3508 wrote to memory of 756 3508 Explorer.EXE explorer.exe PID 3508 wrote to memory of 756 3508 Explorer.EXE explorer.exe PID 3508 wrote to memory of 756 3508 Explorer.EXE explorer.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3508 -
C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"2⤵
- Checks computer location settings
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IlSblFRyVadI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1FB8.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2840
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4072
-
-
-
C:\Windows\SysWOW64\explorer.exe"C:\Windows\SysWOW64\explorer.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:756
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD59c5f354653322ec06ab4ebb449e2437b
SHA1375d5329debbebcf8688639c7ef7981aa77f5534
SHA2568c6ac426262941b59edd01a7e5999cc822f25e8ef4cd9bf5d40e63f00d32faf2
SHA512a97317b55c144fdc08a91c69fef2d40098991ab13a45ceecbd75eabba357ec9f41612b5b1bcc7b4c8e27875b74a6e0ca7019ca8a610eaae2e9de7eb5223f6175