Overview
overview
10Static
static
3IoC/00496083.xls
windows7-x64
3IoC/00496083.xls
windows10-2004-x64
1IoC/680589798891.xls
windows7-x64
3IoC/680589798891.xls
windows10-2004-x64
1Consignmen...df.exe
windows7-x64
10Consignmen...df.exe
windows10-2004-x64
10DHL SHIPME...PD.exe
windows7-x64
10DHL SHIPME...PD.exe
windows10-2004-x64
10EZ0496.exe
windows7-x64
10EZ0496.exe
windows10-2004-x64
10IoC/I05517...55.xls
windows7-x64
3IoC/I05517...55.xls
windows10-2004-x64
1IoC/I79540...11.xls
windows7-x64
3IoC/I79540...11.xls
windows10-2004-x64
1New Order ...22.exe
windows7-x64
10New Order ...22.exe
windows10-2004-x64
10$PLUGINSDIR/Math.dll
windows7-x64
3$PLUGINSDIR/Math.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3Windows.Sy...ns.dll
windows10-2004-x64
3systeminfo.exe
windows10-2004-x64
3wecutil.exe
windows10-2004-x64
3New order ...22.exe
windows7-x64
10New order ...22.exe
windows10-2004-x64
10PO_#YBIC38...py.exe
windows7-x64
3PO_#YBIC38...py.exe
windows10-2004-x64
3Payment Ad...2).exe
windows7-x64
10Payment Ad...2).exe
windows10-2004-x64
10IoC/XSG8996380.xls
windows7-x64
3IoC/XSG8996380.xls
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
23-12-2024 21:57
Static task
static1
Behavioral task
behavioral1
Sample
IoC/00496083.xls
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
IoC/00496083.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
IoC/680589798891.xls
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
IoC/680589798891.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
Consignment Document.pdf.exe
Resource
win7-20240729-en
Behavioral task
behavioral6
Sample
Consignment Document.pdf.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral7
Sample
DHL SHIPMENT NOTIFICATION 284748395PD.exe
Resource
win7-20240708-en
Behavioral task
behavioral8
Sample
DHL SHIPMENT NOTIFICATION 284748395PD.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral9
Sample
EZ0496.exe
Resource
win7-20241023-en
Behavioral task
behavioral10
Sample
EZ0496.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral11
Sample
IoC/I055170_06975755.xls
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
IoC/I055170_06975755.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral13
Sample
IoC/I795405_33242211.xls
Resource
win7-20241010-en
Behavioral task
behavioral14
Sample
IoC/I795405_33242211.xls
Resource
win10v2004-20241007-en
Behavioral task
behavioral15
Sample
New Order 00027748585 02222022.exe
Resource
win7-20240729-en
Behavioral task
behavioral16
Sample
New Order 00027748585 02222022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral17
Sample
$PLUGINSDIR/Math.dll
Resource
win7-20241010-en
Behavioral task
behavioral18
Sample
$PLUGINSDIR/Math.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral19
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral21
Sample
Windows.System.Diagnostics.TraceReporting.PlatformDiagnosticActions.dll
Resource
win10v2004-20241007-en
Behavioral task
behavioral22
Sample
systeminfo.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral23
Sample
wecutil.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral24
Sample
New order 003848848575 02162022.exe
Resource
win7-20240903-en
Behavioral task
behavioral25
Sample
New order 003848848575 02162022.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral26
Sample
PO_#YBIC3892900183902328_Evaluated Copy.exe
Resource
win7-20241023-en
Behavioral task
behavioral27
Sample
PO_#YBIC3892900183902328_Evaluated Copy.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral28
Sample
Payment Advice for Outstanding Invoices (2).exe
Resource
win7-20240903-en
Behavioral task
behavioral29
Sample
Payment Advice for Outstanding Invoices (2).exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral30
Sample
IoC/XSG8996380.xls
Resource
win7-20240903-en
Behavioral task
behavioral31
Sample
IoC/XSG8996380.xls
Resource
win10v2004-20241007-en
General
-
Target
Payment Advice for Outstanding Invoices (2).exe
-
Size
621KB
-
MD5
2a2d3e7c62d3b3a9e9ef3565f04a2dc5
-
SHA1
e4829cc9645d8c2a26929d2f132cf6d0f358a988
-
SHA256
c435fcfb3786d573ede77e30ded01503640a4de64523df7e9078cfc572381ced
-
SHA512
0226f28426976c5bd064caabea3645062a99e1b1e99e79e4d518c783e208b299534ea9a4d1180bc43651fb1b65f72440382910b7ddf30e57ee4b8c9c9a732871
-
SSDEEP
12288:7Zbr8K777777777777TkNdgOG0IzkXh7aolFyiSu61xdEJXouOo0XSLEdigeAaui:7F8K777777777777TiP8EFhmoMst
Malware Config
Extracted
xloader
2.5
nqni
lekitaly.com
heroteas.com
funtique.art
cedarmoonshop.com
greenozon.com
jonescompanysolutions.com
pdxls.com
icreateandcut.com
healthylifeagainnow.com
zhongxinzxpz.top
hotelsaskatchewan.info
louisebeckinsale.net
hivizpeople.com
sanjoseejidillo.com
turnspout.net
suddennnnnnnnnnnn02.xyz
annianzu.icu
webdesigncharlestonsc.com
headrank.agency
bradyiconmusiccenter.com
bestemdurano.quest
mkbau-quickborn.com
telesportsbetting.com
zvedaventeco.quest
paradgmpharma.com
sarrosh.com
archivoibagon.xyz
alhelicanas.com
dazalogistics.com
timeless-express.com
otelcollector.com
marfez.net
kulturacosmetics.com
dbcvj.com
miracleinrecovery.com
palmsugar.biz
ingenuitygs.com
footprintorg.com
niceauto.mobi
tenlog001.xyz
visionaryentertainmentllc.com
vidasaludabledesdecasa.com
moreosin.com
hyggealewee.quest
cacaolixir.com
gowamerica.com
wynningforyou.com
kopekgiysileri.xyz
londcwtoyof6.xyz
knowunknow.com
senegencehr.com
desovote.com
724ototamir.com
ktnword.xyz
suaveluna.com
prowebcraft.net
h2waj537c697.biz
awesomeappsmusicdownloader.top
thebougiebrandshop.com
fullarchsuccess.com
supremepeakmaleenhancement.com
estabuloburgers.com
729321.com
avaxbridgeapes.com
apollorealtors.com
Signatures
-
Xloader family
-
Xloader payload 3 IoCs
resource yara_rule behavioral28/memory/2360-17-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral28/memory/2360-21-0x0000000000400000-0x0000000000429000-memory.dmp xloader behavioral28/memory/2720-26-0x00000000000F0000-0x0000000000119000-memory.dmp xloader -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2308 set thread context of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2360 set thread context of 1224 2360 Payment Advice for Outstanding Invoices (2).exe 21 PID 2720 set thread context of 1224 2720 cmstp.exe 21 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Payment Advice for Outstanding Invoices (2).exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmstp.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2708 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 27 IoCs
pid Process 2308 Payment Advice for Outstanding Invoices (2).exe 2360 Payment Advice for Outstanding Invoices (2).exe 2360 Payment Advice for Outstanding Invoices (2).exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe 2720 cmstp.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
pid Process 2360 Payment Advice for Outstanding Invoices (2).exe 2360 Payment Advice for Outstanding Invoices (2).exe 2360 Payment Advice for Outstanding Invoices (2).exe 2720 cmstp.exe 2720 cmstp.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2308 Payment Advice for Outstanding Invoices (2).exe Token: SeDebugPrivilege 2360 Payment Advice for Outstanding Invoices (2).exe Token: SeDebugPrivilege 2720 cmstp.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2308 wrote to memory of 2708 2308 Payment Advice for Outstanding Invoices (2).exe 31 PID 2308 wrote to memory of 2708 2308 Payment Advice for Outstanding Invoices (2).exe 31 PID 2308 wrote to memory of 2708 2308 Payment Advice for Outstanding Invoices (2).exe 31 PID 2308 wrote to memory of 2708 2308 Payment Advice for Outstanding Invoices (2).exe 31 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 2308 wrote to memory of 2360 2308 Payment Advice for Outstanding Invoices (2).exe 33 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35 PID 1224 wrote to memory of 2720 1224 Explorer.EXE 35
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IlSblFRyVadI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp53BB.tmp"3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2708
-
-
C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2360
-
-
-
C:\Windows\SysWOW64\autoconv.exe"C:\Windows\SysWOW64\autoconv.exe"2⤵PID:1632
-
-
C:\Windows\SysWOW64\cmstp.exe"C:\Windows\SysWOW64\cmstp.exe"2⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:2720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5aea361e0d958585063b984aab3003f86
SHA1c8e9c941ea6a2f5fdeebe1dafe059495922e8fcf
SHA256a86143ac52bc82907a668bed4115b09d345d731b0b69867b6b7bd42c00c83d66
SHA512bfe973cecbe75542a7bd0d5ec5a23de6a6641231407305522a3a100bdc82ca9436204f73e69b0c9c6568ad4c92bf79fc5f56d1d9beceeb2e28afe04e73186517