Analysis
-
max time kernel
149s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
Original BL Invoice & Packing List pdf.exe
Resource
win7-20240708-en
General
-
Target
Original BL Invoice & Packing List pdf.exe
-
Size
1.2MB
-
MD5
32edc7a227ce30813c73756c2fdc90cd
-
SHA1
bcf54c69b988f72a819f15692f53f5eb839a4be7
-
SHA256
3f88232fbf581d4a628de3b80c624fdabea29d159917ef596fe13b2f49f8268e
-
SHA512
c97da96cd175f107538eae3a7eef076b24faf69721ab52a2d01b0a5b2c67f3140c2b8eef48d51a4b74334eac8f678116102705aff66cc127eef8c82693a9f989
-
SSDEEP
24576:aYNkCmS4OsBgo0q4wMZa3mK/vfW+t3leBsAU8:aEZoHMZa2K3P1eB
Malware Config
Extracted
xloader
2.3
c3sc
vnye2037.com
adopttongling.com
miss-bim.com
ylyqrbii.icu
iregentos.info
teseipropiedades.com
jsprimer.com
keepminkowicz.com
7999399.com
bdgooddq.com
komovnrebi.com
politicalswim.com
justokaydrawings.com
eglidons.com
ici-voyant.com
thirstymarketing.com
viajesyturismo360.com
shadesofshadow.com
learnenglishinceret.com
notnotdown.club
bbucollection.com
seawavesapparel.com
ujjjnkkok.com
dabuddhaboyz.com
perteprampram10.net
thecoconutsisters.com
bttjmy.com
victorialoraine.com
movilplaceperu.com
ergobaby-carriers.com
kelseywishart.design
vibesing.com
remedioscaserorecetas.com
rangerredplus.com
cocoframe.com
classicvineyardsundowner.com
cv62.xyz
growyourownbuildersllc.com
zowieweb.com
evoluere.com
customnetworks4u.com
kavacaburnaby.com
baisen-coffee.com
gruasdeacero.com
cookislandsmarine.com
sanfranciscotortuguero.com
magacarpinteria.com
cabal2tr.com
pasadenamoda.com
neoframestudios.com
shanghaiys.net
tfxcl88.com
elkuds.net
plazamiddleschool.com
punklotus.com
beptaoquan.com
globaltrainingmarketplace.net
master-tim.com
zz-ims.com
parallelplayonline.com
whatthefreightbrokers.net
divibezfashionboutique.com
lauraochoa.com
freshcutbouquets.com
myapology.world
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral1/memory/2200-3-0x0000000000290000-0x00000000002A2000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral1/memory/2196-14-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/2196-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral1/memory/1804-25-0x00000000000E0000-0x0000000000109000-memory.dmp xloader -
Deletes itself 1 IoCs
pid Process 2208 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2200 set thread context of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2196 set thread context of 1260 2196 Original BL Invoice & Packing List pdf.exe 21 PID 1804 set thread context of 1260 1804 cmstp.exe 21 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Original BL Invoice & Packing List pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 21 IoCs
pid Process 2200 Original BL Invoice & Packing List pdf.exe 2200 Original BL Invoice & Packing List pdf.exe 2196 Original BL Invoice & Packing List pdf.exe 2196 Original BL Invoice & Packing List pdf.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe 1804 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2196 Original BL Invoice & Packing List pdf.exe 2196 Original BL Invoice & Packing List pdf.exe 2196 Original BL Invoice & Packing List pdf.exe 1804 cmstp.exe 1804 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2200 Original BL Invoice & Packing List pdf.exe Token: SeDebugPrivilege 2196 Original BL Invoice & Packing List pdf.exe Token: SeDebugPrivilege 1804 cmstp.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2200 wrote to memory of 2548 2200 Original BL Invoice & Packing List pdf.exe 31 PID 2200 wrote to memory of 2548 2200 Original BL Invoice & Packing List pdf.exe 31 PID 2200 wrote to memory of 2548 2200 Original BL Invoice & Packing List pdf.exe 31 PID 2200 wrote to memory of 2548 2200 Original BL Invoice & Packing List pdf.exe 31 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 2200 wrote to memory of 2196 2200 Original BL Invoice & Packing List pdf.exe 32 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1260 wrote to memory of 1804 1260 Explorer.EXE 33 PID 1804 wrote to memory of 2208 1804 cmstp.exe 34 PID 1804 wrote to memory of 2208 1804 cmstp.exe 34 PID 1804 wrote to memory of 2208 1804 cmstp.exe 34 PID 1804 wrote to memory of 2208 1804 cmstp.exe 34
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"3⤵PID:2548
-
-
C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2196
-
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1804 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"3⤵
- Deletes itself
- System Location Discovery: System Language Discovery
PID:2208
-
-