Analysis
-
max time kernel
132s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:53
Static task
static1
Behavioral task
behavioral1
Sample
DHL_SHIPMENT_REF#290421_73663_pdf.exe
Resource
win7-20240903-en
General
-
Target
DHL_SHIPMENT_REF#290421_73663_pdf.exe
-
Size
645KB
-
MD5
35b5ff4171eea1c0433f592d83631a14
-
SHA1
9a18a2807c82a63c26d71d9be32edc902129b116
-
SHA256
9aa3c6d66305578b1f8743f1f5260453432e9d9e157756640bd7f8cf85facc25
-
SHA512
3cd910a43731ab4d41203d20f348e765e481bcef7b7d583a83862168c82c274146582bcd67de47c145610e6fe7b95560f0b88fb796defe19f0b0cc4d7e05e21c
-
SSDEEP
12288:rG61i3ePiNmR1axgxOjtAgIi6xt11pAnym8E0muRwjWU5qrgqNdYCAWHDIouq6XZ:rG61UeioQgxOfIi4/zAnh8E0mu6WUE32
Malware Config
Extracted
xloader
2.3
f6fw
plumaroja.com
pceasyreview.com
wordsinprogressthegame.com
hiltonbomontieforeaspa.com
amu2020.com
airfieldelectric.com
reasonswhyletter.com
venturabankruptcyattorney.com
contorig2.com
kevinton.com
tiga-roda.com
swallow-express.com
berlins-cuban.com
newhopeadultos.com
yanmq.com
businessfundingtodayscam.com
goldtraderassociates.com
formulasimracing.com
rdifatra.com
asudprr.com
coinbutter.com
12hourchallenge.com
burmester.email
pharmacistshoko.com
tankmaniac.net
chiraaag.tech
ww-homes.com
patrickleahydescendants.com
poshspotaccessories.com
mcclearytrucking.com
hzlingfa.com
czech-lang.space
yipinsutui.com
antalyasml.com
yellushnesme.info
kungfuglobalfamily.com
ticoverde.com
loriinibrand.com
tirmastermind.com
gunsareworthmorethanlives.com
romicore.com
miusc.com
embarkjourney.party
890281.com
stelbertrose.com
metalservicesn.com
commercestudy.online
vbetcostarica.com
uswanews.com
shangmai.plus
kreuzbags.com
designlyticsuk.com
trselfstorage.com
joshimaria.com
poseidonbeauty.com
ministernarf.com
wdnanshan.com
nailsnhang.com
powersandprospects.net
jetsurf-versicherung.com
medicareschoolcommunity.com
prevenirelcoronavirus-co.com
greedysafely.com
byteidolon.com
alleyesonegipt.com
Signatures
-
Xloader family
-
Xloader payload 1 IoCs
resource yara_rule behavioral2/memory/3604-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2428 set thread context of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL_SHIPMENT_REF#290421_73663_pdf.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3604 DHL_SHIPMENT_REF#290421_73663_pdf.exe 3604 DHL_SHIPMENT_REF#290421_73663_pdf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2428 wrote to memory of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91 PID 2428 wrote to memory of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91 PID 2428 wrote to memory of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91 PID 2428 wrote to memory of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91 PID 2428 wrote to memory of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91 PID 2428 wrote to memory of 3604 2428 DHL_SHIPMENT_REF#290421_73663_pdf.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\DHL_SHIPMENT_REF#290421_73663_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL_SHIPMENT_REF#290421_73663_pdf.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\DHL_SHIPMENT_REF#290421_73663_pdf.exe"C:\Users\Admin\AppData\Local\Temp\DHL_SHIPMENT_REF#290421_73663_pdf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
PID:3604
-