Analysis
-
max time kernel
148s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/11/2024, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
DHL INV _AWB.exe
Resource
win7-20240903-en
General
-
Target
DHL INV _AWB.exe
-
Size
942KB
-
MD5
123657146d91536f96286717786d45a4
-
SHA1
601ad65123b6417d4b5368974247e5fe4c808d2b
-
SHA256
4a82f9fe9128707c38e60ee4feea398d4edfcca38d066ed3670b5858d8685a05
-
SHA512
4adaa3bd089bd5d449b00438f58fa7b30ccb3cf81731498645f44b40b387d534c68e2aab66a2c587a71e5df84578a6c5dafc7de34bd375528d1a387899b6cb9e
-
SSDEEP
24576:GwOuJARseTMqhJqJIP4wkyKwWhmdraLqs:xPARsSZhJqy4pl4N
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2756-12-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2756-16-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral1/memory/2864-23-0x0000000000090000-0x00000000000B8000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2696 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2948 set thread context of 2756 2948 DHL INV _AWB.exe 31 PID 2756 set thread context of 1168 2756 DHL INV _AWB.exe 21 PID 2864 set thread context of 1168 2864 rundll32.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL INV _AWB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2756 DHL INV _AWB.exe 2756 DHL INV _AWB.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe 2864 rundll32.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2756 DHL INV _AWB.exe 2756 DHL INV _AWB.exe 2756 DHL INV _AWB.exe 2864 rundll32.exe 2864 rundll32.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2756 DHL INV _AWB.exe Token: SeDebugPrivilege 2864 rundll32.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 2948 wrote to memory of 2756 2948 DHL INV _AWB.exe 31 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 1168 wrote to memory of 2864 1168 Explorer.EXE 32 PID 2864 wrote to memory of 2696 2864 rundll32.exe 33 PID 2864 wrote to memory of 2696 2864 rundll32.exe 33 PID 2864 wrote to memory of 2696 2864 rundll32.exe 33 PID 2864 wrote to memory of 2696 2864 rundll32.exe 33
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2756
-
-
-
C:\Windows\SysWOW64\rundll32.exe"C:\Windows\SysWOW64\rundll32.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2696
-
-