Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
It's Friday, let's have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:
AI Analysis
Technical Summary
This threat involves a phishing campaign disguised as a FedEx delivery notification email containing a 7z archive named "fedex_shipping_document.7z". Inside is a Windows batch (.bat) script with the same name that is not heavily obfuscated but uses delayed environment variable expansion ("!var!") to evade simple string-based detections that look for "%VAR%" patterns. The script establishes persistence by creating a Run key in the Windows registry pointing to a copy of itself in the %APPDATA%\Rail directory. It then launches a PowerShell one-liner that extracts a Base64-encoded payload embedded within the script using regular expressions. The initial Base64 payload is crafted to evade detection by common tools like base64dump. Once decoded, the PowerShell script decrypts an AES-encrypted payload using extracted IV and salt values. The decrypted payload is shellcode that is injected into the explorer.exe process, where a new thread is created to execute it. This shellcode is consistent with DonutLoader-delivered XWorm malware, which establishes a connection to a command and control (C2) server at IP 204.10.160.190 on port 7003. The malware includes some anti-debugging and anti-sandboxing techniques, such as checking CPU cores and waiting for the explorer process to ensure a user is logged in, but these checks are incomplete or not fully implemented. The overall attack chain relies on user interaction to open the archive and execute the batch script, leading to system compromise and remote attacker control.
Potential Impact
Organizations worldwide face risks of credential theft, data exfiltration, lateral movement, and persistent remote access due to this malware. The use of persistence mechanisms and process injection allows the malware to maintain foothold even after reboots. The connection to a remote C2 server enables attackers to issue commands, deploy additional payloads, or move laterally within networks. This can lead to operational disruption, intellectual property theft, and potential ransomware deployment if attackers escalate privileges. The malware’s evasion techniques reduce detection likelihood, increasing dwell time and damage potential. While the attack requires user interaction, phishing remains a common vector, especially in sectors with high email volumes such as logistics, finance, and government. The presence of XWorm, a known remote access trojan, further elevates the threat by enabling attackers to control infected systems stealthily.
Mitigation Recommendations
Organizations should implement advanced email filtering to detect and quarantine suspicious attachments, especially archives containing scripts. Endpoint detection and response (EDR) solutions should be tuned to detect delayed environment variable expansion and PowerShell-based code injection techniques. Monitoring for persistence mechanisms such as unexpected Run registry keys and anomalous explorer.exe process injections is critical. Network monitoring should include alerts for outbound connections to uncommon ports and IP addresses, particularly those matching known C2 infrastructure. User training must emphasize the risks of opening unsolicited attachments, even from trusted brands like FedEx. Disabling or restricting PowerShell execution policies and logging PowerShell activity can help detect and prevent execution of malicious scripts. Regular threat hunting for indicators such as the specific SHA256 hash of the archive and related artifacts can aid early detection. Finally, maintaining up-to-date backups and incident response plans ensures resilience against potential compromise.
Affected Countries
United States, Canada, United Kingdom, Germany, France, Australia, Netherlands, Japan, South Korea, Singapore
Fake Fedex Email Delivers Donuts!, (Fri, Feb 27th)
Description
It's Friday, let's have a look at another simple piece of malware to close a busy week! I received a Fedex notification about a delivery. Usually, such emails are simple phishing attacks that redirect you to a fake login page to collect your credentials. Here, it was a bit different:
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
This threat involves a phishing campaign disguised as a FedEx delivery notification email containing a 7z archive named "fedex_shipping_document.7z". Inside is a Windows batch (.bat) script with the same name that is not heavily obfuscated but uses delayed environment variable expansion ("!var!") to evade simple string-based detections that look for "%VAR%" patterns. The script establishes persistence by creating a Run key in the Windows registry pointing to a copy of itself in the %APPDATA%\Rail directory. It then launches a PowerShell one-liner that extracts a Base64-encoded payload embedded within the script using regular expressions. The initial Base64 payload is crafted to evade detection by common tools like base64dump. Once decoded, the PowerShell script decrypts an AES-encrypted payload using extracted IV and salt values. The decrypted payload is shellcode that is injected into the explorer.exe process, where a new thread is created to execute it. This shellcode is consistent with DonutLoader-delivered XWorm malware, which establishes a connection to a command and control (C2) server at IP 204.10.160.190 on port 7003. The malware includes some anti-debugging and anti-sandboxing techniques, such as checking CPU cores and waiting for the explorer process to ensure a user is logged in, but these checks are incomplete or not fully implemented. The overall attack chain relies on user interaction to open the archive and execute the batch script, leading to system compromise and remote attacker control.
Potential Impact
Organizations worldwide face risks of credential theft, data exfiltration, lateral movement, and persistent remote access due to this malware. The use of persistence mechanisms and process injection allows the malware to maintain foothold even after reboots. The connection to a remote C2 server enables attackers to issue commands, deploy additional payloads, or move laterally within networks. This can lead to operational disruption, intellectual property theft, and potential ransomware deployment if attackers escalate privileges. The malware’s evasion techniques reduce detection likelihood, increasing dwell time and damage potential. While the attack requires user interaction, phishing remains a common vector, especially in sectors with high email volumes such as logistics, finance, and government. The presence of XWorm, a known remote access trojan, further elevates the threat by enabling attackers to control infected systems stealthily.
Mitigation Recommendations
Organizations should implement advanced email filtering to detect and quarantine suspicious attachments, especially archives containing scripts. Endpoint detection and response (EDR) solutions should be tuned to detect delayed environment variable expansion and PowerShell-based code injection techniques. Monitoring for persistence mechanisms such as unexpected Run registry keys and anomalous explorer.exe process injections is critical. Network monitoring should include alerts for outbound connections to uncommon ports and IP addresses, particularly those matching known C2 infrastructure. User training must emphasize the risks of opening unsolicited attachments, even from trusted brands like FedEx. Disabling or restricting PowerShell execution policies and logging PowerShell activity can help detect and prevent execution of malicious scripts. Regular threat hunting for indicators such as the specific SHA256 hash of the archive and related artifacts can aid early detection. Finally, maintaining up-to-date backups and incident response plans ensures resilience against potential compromise.
Technical Details
- Article Source
- {"url":"https://isc.sans.edu/diary/rss/32754","fetched":true,"fetchedAt":"2026-02-27T12:25:16.388Z","wordCount":551}
Threat ID: 69a18d2c32ffcdb8a22c9d0c
Added to database: 2/27/2026, 12:25:16 PM
Last enriched: 2/27/2026, 12:25:25 PM
Last updated: 4/13/2026, 8:04:37 PM
Views: 119
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.