Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-04-2021 06:54

General

  • Target

    PO-RFQ # 097663899.exe

  • Size

    520KB

  • MD5

    3a480d8d735efe129dcccea48a054721

  • SHA1

    444f3d7795694fb3fd462b6cf3f5c2776e4a1196

  • SHA256

    006dcd5baa67723c1d34336ca9d3eb55eb53cdb58999a8c6a3a64b28c2848220

  • SHA512

    665f468fd10cab796c277b3d5e9344b00f443f837010deb810e9da0e1265d8d3d997d9e60ae467916a8807818ac0a8c63d9c40d7e5c86c89d43961174c3b68c4

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.aquaroyaume.com/uabu/

Decoy

khedutbajar.com

vehicleporn.com

misanthropedia.com

partum.life

tenshinstore.com

51tayi.com

rgr.one

lattakia-imbiss.com

escalerasdemetal.com

nationalurc.info

prettygalglam.com

globalperfumery.com

ivulam.xyz

qingniang.club

quick2ulube.com

curiget.xyz

ujeiakosdka.com

lacapitalcaferestaurant.com

agarkovsport.online

okashidonya.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Users\Admin\AppData\Local\Temp\PO-RFQ # 097663899.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-RFQ # 097663899.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1308
      • C:\Users\Admin\AppData\Local\Temp\PO-RFQ # 097663899.exe
        "C:\Users\Admin\AppData\Local\Temp\PO-RFQ # 097663899.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1736
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3840
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PO-RFQ # 097663899.exe"
        3⤵
          PID:768

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/768-24-0x0000000000000000-mapping.dmp
    • memory/1308-9-0x0000000005950000-0x0000000005951000-memory.dmp
      Filesize

      4KB

    • memory/1308-5-0x00000000056D0000-0x00000000056D1000-memory.dmp
      Filesize

      4KB

    • memory/1308-6-0x0000000005C70000-0x0000000005C71000-memory.dmp
      Filesize

      4KB

    • memory/1308-7-0x0000000005770000-0x0000000005771000-memory.dmp
      Filesize

      4KB

    • memory/1308-8-0x0000000005610000-0x0000000005611000-memory.dmp
      Filesize

      4KB

    • memory/1308-3-0x0000000000D80000-0x0000000000D81000-memory.dmp
      Filesize

      4KB

    • memory/1308-10-0x0000000005690000-0x0000000005691000-memory.dmp
      Filesize

      4KB

    • memory/1308-11-0x0000000007290000-0x0000000007294000-memory.dmp
      Filesize

      16KB

    • memory/1308-12-0x000000007E450000-0x000000007E451000-memory.dmp
      Filesize

      4KB

    • memory/1308-13-0x0000000001640000-0x00000000016B5000-memory.dmp
      Filesize

      468KB

    • memory/1308-14-0x0000000001700000-0x000000000172E000-memory.dmp
      Filesize

      184KB

    • memory/1308-2-0x0000000073C50000-0x000000007433E000-memory.dmp
      Filesize

      6.9MB

    • memory/1736-16-0x000000000041D070-mapping.dmp
    • memory/1736-19-0x0000000001380000-0x00000000016A0000-memory.dmp
      Filesize

      3.1MB

    • memory/1736-18-0x0000000001820000-0x0000000001831000-memory.dmp
      Filesize

      68KB

    • memory/1736-15-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2352-20-0x0000000005000000-0x0000000005160000-memory.dmp
      Filesize

      1.4MB

    • memory/2352-27-0x0000000000A50000-0x0000000000AE8000-memory.dmp
      Filesize

      608KB

    • memory/3840-21-0x0000000000000000-mapping.dmp
    • memory/3840-23-0x0000000000500000-0x0000000000529000-memory.dmp
      Filesize

      164KB

    • memory/3840-22-0x0000000000EE0000-0x0000000000EFE000-memory.dmp
      Filesize

      120KB

    • memory/3840-25-0x0000000002F00000-0x0000000003220000-memory.dmp
      Filesize

      3.1MB

    • memory/3840-26-0x0000000000C40000-0x0000000000CD0000-memory.dmp
      Filesize

      576KB