Analysis
-
max time kernel
145s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 19:54
Static task
static1
Behavioral task
behavioral1
Sample
package delivery failed.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
package delivery failed.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/srrk.dll
Resource
win7-20241010-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/srrk.dll
Resource
win10v2004-20241007-en
General
-
Target
package delivery failed.exe
-
Size
333KB
-
MD5
696f70a52e873abbb6fe59673092d9d8
-
SHA1
e106d3dcebaa06ee19a246620d8e392d3977f19d
-
SHA256
a4b5549649c6a3bb9deccccd340fbbb60519fcb0e4091004628ea3b611dc0e3c
-
SHA512
ef7d57821de9e65b023fa53d38a2f4998ae11783834ecc41af1ea77b8c7e2307c22f48bbe2f7cca02b984f17292431dcf8796a0b4f501bfbe18458980906d6c2
-
SSDEEP
6144:BBlL/ClGiQcRn2GMYjZxHLweHq5MZ7qVZq+ElZqwA3XHqsV/n:HQlBQcd3MYjZxHUeHwMZuV8XlZqH3
Malware Config
Extracted
xloader
2.5
u4an
crossroadsinndfs.com
reichsland.top
tomrose.net
zoneindrones.net
814851.com
pingblackjack.com
pdsolutions.tech
sweethomecolorado.net
witterx.com
beneschcyberconsulting.com
electroborg.com
metodopita.com
picklericktoken.com
alkhawatercafe.com
lelittnpasumo4.xyz
osrr.top
khonnaisoi.com
jbbaudienstleistungen.com
theconfidenceboosterprogram.com
diamondtrade.net
monakko.net
localproperty.team
thpanel.space
vivatitech.com
owaygeo.com
promo-solana.com
icarus-groupe.com
kansaspetshop.com
thelumenclinic.com
prostitutkiizhevskarelax.info
iluniui.com
aitmrdap.com
empiremunitions.com
socio.mobi
henagraphic.com
universobraasilshop.com
garlicjoysnap.xyz
784211.com
evanocrm.com
nousecos.com
suddennnnnnnnnnnn05.xyz
mcintoshelections.com
terrapack.net
aquaeyego.com
alardellyux.com
thekatz.group
b8ouzr.biz
urteuzemni.quest
paciloop.com
regencyimperial.com
coqttwvfwc.com
rapaddix.com
xn--pgb3df.com
city-trustonline.com
merakilifestyleconsulting.com
ratnagirikosh.com
munixc.info
alseermarine-defence.com
nastymales.com
woodrichevents.com
junyechoo.net
vertentebike.com
bestofsaltlakecity.net
betterlifegarciniatechnow.com
masa88.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2824-9-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2824-11-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2692-17-0x00000000000C0000-0x00000000000E9000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2584 cmd.exe -
Loads dropped DLL 1 IoCs
pid Process 2668 package delivery failed.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2668 set thread context of 2824 2668 package delivery failed.exe 30 PID 2824 set thread context of 1252 2824 package delivery failed.exe 21 PID 2692 set thread context of 1252 2692 cmmon32.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language package delivery failed.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmmon32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 31 IoCs
pid Process 2824 package delivery failed.exe 2824 package delivery failed.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe 2692 cmmon32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2824 package delivery failed.exe 2824 package delivery failed.exe 2824 package delivery failed.exe 2692 cmmon32.exe 2692 cmmon32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2824 package delivery failed.exe Token: SeDebugPrivilege 2692 cmmon32.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 2668 wrote to memory of 2824 2668 package delivery failed.exe 30 PID 1252 wrote to memory of 2692 1252 Explorer.EXE 31 PID 1252 wrote to memory of 2692 1252 Explorer.EXE 31 PID 1252 wrote to memory of 2692 1252 Explorer.EXE 31 PID 1252 wrote to memory of 2692 1252 Explorer.EXE 31 PID 2692 wrote to memory of 2584 2692 cmmon32.exe 32 PID 2692 wrote to memory of 2584 2692 cmmon32.exe 32 PID 2692 wrote to memory of 2584 2692 cmmon32.exe 32 PID 2692 wrote to memory of 2584 2692 cmmon32.exe 32
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\package delivery failed.exe"C:\Users\Admin\AppData\Local\Temp\package delivery failed.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\package delivery failed.exe"C:\Users\Admin\AppData\Local\Temp\package delivery failed.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2824
-
-
-
C:\Windows\SysWOW64\cmmon32.exe"C:\Windows\SysWOW64\cmmon32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\package delivery failed.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2584
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5a3caa7e8895fb8eccc4cfc84c2f37283
SHA10c10231f8b45a1f6d9037fab396310a35fc572c5
SHA2567b153187b30e47fda2f39d2621c04dded4e6776fabbebf5cc6a6a157a8324c02
SHA512b96bdf0909a777ff559d31ac0600a5bbf90fcfa322232b4818ee275a2fda7638c4d06cb493f746a79e30367400ce2d252c46918e3dfbed851be81d1399b42c16