Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20-04-2021 15:32

General

  • Target

    vbc.exe

  • Size

    331KB

  • MD5

    a5c974a5617823b3de03e26b469ad47d

  • SHA1

    197b391fcd3b7b41e07f819535691405194fe2a4

  • SHA256

    a3ae710cb1edbfd1f9cc33ab53ffddd288646a040118b2bc252cc6ac070a8308

  • SHA512

    b660fab41fadc6497216ef3f0e3750f153f5f59f5dba0e30c60afba731b368b65d18576f1f5ca8ef10b52df97423f9addf1d1f9fd296d779c0d8d51e968ae4d1

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.nyclgbxyi.icu/u6nq/

Decoy

lamailefr.com

creativesword.com

mpconnextions.com

tureture-diary.net

ateamtotalcare.com

ihealthsauna.com

contex33.xyz

hotege.club

candiceco.com

southerntwistent.com

foivgohl.com

azetheelynn.art

galsmith.com

alphaquantumfunds.site

mursiony.club

ajobfit.com

resourceunits.com

metropolitanez.net

shaohuizq.com

tedbagsstore.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\vbc.exe
      "C:\Users\Admin\AppData\Local\Temp\vbc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Users\Admin\AppData\Local\Temp\vbc.exe
        "C:\Users\Admin\AppData\Local\Temp\vbc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3904
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:412
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\vbc.exe"
        3⤵
          PID:1452

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Defense Evasion

    Scripting

    1
    T1064

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/412-125-0x0000000002E30000-0x0000000002EDE000-memory.dmp
      Filesize

      696KB

    • memory/412-121-0x0000000000000000-mapping.dmp
    • memory/412-124-0x0000000002E00000-0x0000000002E28000-memory.dmp
      Filesize

      160KB

    • memory/412-123-0x0000000000140000-0x0000000000147000-memory.dmp
      Filesize

      28KB

    • memory/412-126-0x00000000032E0000-0x000000000336F000-memory.dmp
      Filesize

      572KB

    • memory/796-116-0x00000000009B0000-0x00000000009DA000-memory.dmp
      Filesize

      168KB

    • memory/1452-122-0x0000000000000000-mapping.dmp
    • memory/3024-120-0x0000000002610000-0x00000000026C2000-memory.dmp
      Filesize

      712KB

    • memory/3024-127-0x0000000004760000-0x00000000047F6000-memory.dmp
      Filesize

      600KB

    • memory/3904-115-0x000000000041CFF0-mapping.dmp
    • memory/3904-118-0x00000000009D0000-0x0000000000CF0000-memory.dmp
      Filesize

      3.1MB

    • memory/3904-119-0x00000000009A0000-0x00000000009B0000-memory.dmp
      Filesize

      64KB

    • memory/3904-114-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB