Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:36
Static task
static1
Behavioral task
behavioral1
Sample
Original BL Invoice & Packing List pdf.exe
Resource
win7-20240708-en
General
-
Target
Original BL Invoice & Packing List pdf.exe
-
Size
1.2MB
-
MD5
32edc7a227ce30813c73756c2fdc90cd
-
SHA1
bcf54c69b988f72a819f15692f53f5eb839a4be7
-
SHA256
3f88232fbf581d4a628de3b80c624fdabea29d159917ef596fe13b2f49f8268e
-
SHA512
c97da96cd175f107538eae3a7eef076b24faf69721ab52a2d01b0a5b2c67f3140c2b8eef48d51a4b74334eac8f678116102705aff66cc127eef8c82693a9f989
-
SSDEEP
24576:aYNkCmS4OsBgo0q4wMZa3mK/vfW+t3leBsAU8:aEZoHMZa2K3P1eB
Malware Config
Extracted
xloader
2.3
c3sc
vnye2037.com
adopttongling.com
miss-bim.com
ylyqrbii.icu
iregentos.info
teseipropiedades.com
jsprimer.com
keepminkowicz.com
7999399.com
bdgooddq.com
komovnrebi.com
politicalswim.com
justokaydrawings.com
eglidons.com
ici-voyant.com
thirstymarketing.com
viajesyturismo360.com
shadesofshadow.com
learnenglishinceret.com
notnotdown.club
bbucollection.com
seawavesapparel.com
ujjjnkkok.com
dabuddhaboyz.com
perteprampram10.net
thecoconutsisters.com
bttjmy.com
victorialoraine.com
movilplaceperu.com
ergobaby-carriers.com
kelseywishart.design
vibesing.com
remedioscaserorecetas.com
rangerredplus.com
cocoframe.com
classicvineyardsundowner.com
cv62.xyz
growyourownbuildersllc.com
zowieweb.com
evoluere.com
customnetworks4u.com
kavacaburnaby.com
baisen-coffee.com
gruasdeacero.com
cookislandsmarine.com
sanfranciscotortuguero.com
magacarpinteria.com
cabal2tr.com
pasadenamoda.com
neoframestudios.com
shanghaiys.net
tfxcl88.com
elkuds.net
plazamiddleschool.com
punklotus.com
beptaoquan.com
globaltrainingmarketplace.net
master-tim.com
zz-ims.com
parallelplayonline.com
whatthefreightbrokers.net
divibezfashionboutique.com
lauraochoa.com
freshcutbouquets.com
myapology.world
Signatures
-
Xloader family
-
CustAttr .NET packer 1 IoCs
Detects CustAttr .NET packer in memory.
resource yara_rule behavioral2/memory/4884-8-0x0000000003260000-0x0000000003272000-memory.dmp CustAttr -
Xloader payload 3 IoCs
resource yara_rule behavioral2/memory/4280-13-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/4280-18-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral2/memory/1348-24-0x0000000000900000-0x0000000000929000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4884 set thread context of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 4280 set thread context of 3424 4280 Original BL Invoice & Packing List pdf.exe 56 PID 1348 set thread context of 3424 1348 netsh.exe 56 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Original BL Invoice & Packing List pdf.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language netsh.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious behavior: EnumeratesProcesses 40 IoCs
pid Process 4280 Original BL Invoice & Packing List pdf.exe 4280 Original BL Invoice & Packing List pdf.exe 4280 Original BL Invoice & Packing List pdf.exe 4280 Original BL Invoice & Packing List pdf.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe 1348 netsh.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 4280 Original BL Invoice & Packing List pdf.exe 4280 Original BL Invoice & Packing List pdf.exe 4280 Original BL Invoice & Packing List pdf.exe 1348 netsh.exe 1348 netsh.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4280 Original BL Invoice & Packing List pdf.exe Token: SeDebugPrivilege 1348 netsh.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4884 wrote to memory of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 4884 wrote to memory of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 4884 wrote to memory of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 4884 wrote to memory of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 4884 wrote to memory of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 4884 wrote to memory of 4280 4884 Original BL Invoice & Packing List pdf.exe 99 PID 3424 wrote to memory of 1348 3424 Explorer.EXE 100 PID 3424 wrote to memory of 1348 3424 Explorer.EXE 100 PID 3424 wrote to memory of 1348 3424 Explorer.EXE 100 PID 1348 wrote to memory of 1344 1348 netsh.exe 101 PID 1348 wrote to memory of 1344 1348 netsh.exe 101 PID 1348 wrote to memory of 1344 1348 netsh.exe 101
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4884 -
C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
-
-
C:\Windows\SysWOW64\netsh.exe"C:\Windows\SysWOW64\netsh.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1348 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Original BL Invoice & Packing List pdf.exe"3⤵
- System Location Discovery: System Language Discovery
PID:1344
-
-