Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    04-03-2021 16:00

General

  • Target

    gotv.exe

  • Size

    164KB

  • MD5

    1da73d4931cd6893f7b9fc765225a62d

  • SHA1

    cdc4992d5e425628b1c12c51d64a9105824bacc5

  • SHA256

    12e42bff4fa377032623342ac1f23a5c87225a40ef8b900cbb06ae4bd203864d

  • SHA512

    fe6d7693e80890b3da7a27d37630d48a4de919b53a8532496fe9c4b66665dde605a46f71d42e228d83fa8d3c92aaadc5a36b50e479f450742ab8a06589820a18

Score
10/10

Malware Config

Extracted

Family

xloader

C2

http://www.pardsoda.com/w25t/

Decoy

nowayinlocksmith.com

bookaprovider.com

joybirder.com

decoracerrado.com

preciousmonments.com

96kixx.com

parentseducationalco-op.com

cbdandbtc.com

santanadeliciasymas.com

finecharlottehomes.com

themanibox.com

backupasia.com

buffalodetailstore.com

iprdo.com

croce-komeko.com

bluechipsgroup.company

truyencow.com

globalism.online

oicrafts.com

naturalawakeningsprograms.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3044
    • C:\Users\Admin\AppData\Local\Temp\gotv.exe
      "C:\Users\Admin\AppData\Local\Temp\gotv.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\gotv.exe
        "C:\Users\Admin\AppData\Local\Temp\gotv.exe"
        3⤵
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2976
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\gotv.exe"
        3⤵
          PID:800

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Discovery

    System Information Discovery

    1
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/684-12-0x0000000000000000-mapping.dmp
    • memory/684-18-0x00000000036E0000-0x000000000376F000-memory.dmp
      Filesize

      572KB

    • memory/684-14-0x0000000000DA0000-0x0000000000DAB000-memory.dmp
      Filesize

      44KB

    • memory/684-16-0x0000000003870000-0x0000000003B90000-memory.dmp
      Filesize

      3.1MB

    • memory/684-15-0x0000000002F70000-0x0000000002F99000-memory.dmp
      Filesize

      164KB

    • memory/800-13-0x0000000000000000-mapping.dmp
    • memory/1144-4-0x0000000002310000-0x000000000231B000-memory.dmp
      Filesize

      44KB

    • memory/2976-7-0x0000000000560000-0x0000000000660000-memory.dmp
      Filesize

      1024KB

    • memory/2976-9-0x000000001E710000-0x000000001EA30000-memory.dmp
      Filesize

      3.1MB

    • memory/2976-10-0x000000001E600000-0x000000001E610000-memory.dmp
      Filesize

      64KB

    • memory/2976-8-0x0000000000401000-0x0000000000541000-memory.dmp
      Filesize

      1.2MB

    • memory/2976-6-0x0000000000401000-0x00000000004FD000-memory.dmp
      Filesize

      1008KB

    • memory/2976-5-0x00000000004018E4-mapping.dmp
    • memory/3044-11-0x0000000002750000-0x000000000281A000-memory.dmp
      Filesize

      808KB

    • memory/3044-19-0x0000000005D50000-0x0000000005E4A000-memory.dmp
      Filesize

      1000KB