Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:06
Static task
static1
Behavioral task
behavioral1
Sample
DHL INV _AWB.exe
Resource
win7-20240903-en
General
-
Target
DHL INV _AWB.exe
-
Size
942KB
-
MD5
123657146d91536f96286717786d45a4
-
SHA1
601ad65123b6417d4b5368974247e5fe4c808d2b
-
SHA256
4a82f9fe9128707c38e60ee4feea398d4edfcca38d066ed3670b5858d8685a05
-
SHA512
4adaa3bd089bd5d449b00438f58fa7b30ccb3cf81731498645f44b40b387d534c68e2aab66a2c587a71e5df84578a6c5dafc7de34bd375528d1a387899b6cb9e
-
SSDEEP
24576:GwOuJARseTMqhJqJIP4wkyKwWhmdraLqs:xPARsSZhJqy4pl4N
Malware Config
Extracted
xloader
2.3
earz
halacoupon.com
anthos-labs.com
hagertylabs.net
l1992.com
856379580.xyz
rcbb-technologies.com
realhoggapparel.com
sauceprince.com
tootingcab.com
4chase5.com
ordergogibibimbap.com
nyj.xyz
dermixspa.com
premiergiftingco.com
razorcentric.com
mbrealtyadvisors.com
officialjazz.club
cctv006.com
hbcuatthepolls.info
prestamos-ya.com
braara.com
yeetgolf.com
lecotonrose.com
cjmakeupartisttx.com
erdhardt.com
talasaz.com
battisonsemtech.com
kblzs.com
educatemyemployees.com
goodgame1.com
graxdev.com
retirementparner.com
oakdalecasino.com
patsoases.com
thebiodetonators.com
bomachinaconvention.com
bett3r.com
2ug35refd.com
wholesalekingsauto.net
welcomeenlighten.club
woman2watch.com
retireemedical-tagcomet.com
astudentdevelop.com
cryptocaviar.com
tedstone.info
racevc.com
eogrlqf.icu
glamourousglory.com
vfb2020.com
hudsonvalleyproject.com
learningtolive365.com
createspace.sucks
kaojinwolove.com
pureandrich.com
textenvsschreiben.com
devis-danseuse-bresilienne.com
nidape-cfm.com
johnnyfong.com
thehappymoose.com
ldq.cool
capdistribution.pro
khangkhilinh.com
biomonde-dannemarie.com
sterlingrhone.com
furnitureizmir.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/2692-13-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/2692-18-0x0000000000400000-0x0000000000428000-memory.dmp xloader behavioral2/memory/1432-23-0x0000000001000000-0x0000000001028000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2160 set thread context of 2692 2160 DHL INV _AWB.exe 99 PID 2692 set thread context of 3488 2692 DHL INV _AWB.exe 56 PID 1432 set thread context of 3488 1432 ipconfig.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language DHL INV _AWB.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ipconfig.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
pid Process 1432 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 2692 DHL INV _AWB.exe 2692 DHL INV _AWB.exe 2692 DHL INV _AWB.exe 2692 DHL INV _AWB.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe 1432 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2692 DHL INV _AWB.exe 2692 DHL INV _AWB.exe 2692 DHL INV _AWB.exe 1432 ipconfig.exe 1432 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2692 DHL INV _AWB.exe Token: SeDebugPrivilege 1432 ipconfig.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2160 wrote to memory of 2692 2160 DHL INV _AWB.exe 99 PID 2160 wrote to memory of 2692 2160 DHL INV _AWB.exe 99 PID 2160 wrote to memory of 2692 2160 DHL INV _AWB.exe 99 PID 2160 wrote to memory of 2692 2160 DHL INV _AWB.exe 99 PID 2160 wrote to memory of 2692 2160 DHL INV _AWB.exe 99 PID 2160 wrote to memory of 2692 2160 DHL INV _AWB.exe 99 PID 3488 wrote to memory of 1432 3488 Explorer.EXE 100 PID 3488 wrote to memory of 1432 3488 Explorer.EXE 100 PID 3488 wrote to memory of 1432 3488 Explorer.EXE 100 PID 1432 wrote to memory of 744 1432 ipconfig.exe 101 PID 1432 wrote to memory of 744 1432 ipconfig.exe 101 PID 1432 wrote to memory of 744 1432 ipconfig.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3488 -
C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2692
-
-
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1432 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\DHL INV _AWB.exe"3⤵
- System Location Discovery: System Language Discovery
PID:744
-
-