Analysis

  • max time kernel
    115s
  • max time network
    105s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    20-04-2021 12:17

General

  • Target

    2dde37e2961514ac44ff69b192de2421.exe

  • Size

    1.0MB

  • MD5

    2dde37e2961514ac44ff69b192de2421

  • SHA1

    d4d39a6072ffe87972d0fa3353e4c4874eab0475

  • SHA256

    18609513507af97f13c81c7e733175ca027c4957f401e61d6654fc2ee7b4cf8c

  • SHA512

    8584177d18e6a5c19706d77535e5201e468b33aa5ca525f022d896a250dbb96d4ee73b04f55f12c8a318f5065b1bb3ae68dacc0d7f0d82240b833afe75085dac

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.adultpeace.com/p2io/

Decoy

essentiallyourscandles.com

cleanxcare.com

bigplatesmallwallet.com

iotcloud.technology

dmgt4m2g8y2uh.net

malcorinmobiliaria.com

thriveglucose.com

fuhaitongxin.com

magetu.info

pyithuhluttaw.net

myfavbutik.com

xzklrhy.com

anewdistraction.com

mercuryaid.net

thesoulrevitalist.com

swayam-moj.com

liminaltechnology.com

lucytime.com

alfenas.info

carmelodesign.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2dde37e2961514ac44ff69b192de2421.exe
    "C:\Users\Admin\AppData\Local\Temp\2dde37e2961514ac44ff69b192de2421.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:648
    • C:\Users\Admin\AppData\Local\Temp\2dde37e2961514ac44ff69b192de2421.exe
      "C:\Users\Admin\AppData\Local\Temp\2dde37e2961514ac44ff69b192de2421.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3576

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/648-114-0x00000000003A0000-0x00000000003A1000-memory.dmp

    Filesize

    4KB

  • memory/648-116-0x0000000004E40000-0x0000000004E41000-memory.dmp

    Filesize

    4KB

  • memory/648-117-0x00000000053E0000-0x00000000053E1000-memory.dmp

    Filesize

    4KB

  • memory/648-118-0x0000000004EE0000-0x0000000004EE1000-memory.dmp

    Filesize

    4KB

  • memory/648-119-0x0000000004EE0000-0x00000000053DE000-memory.dmp

    Filesize

    5.0MB

  • memory/648-120-0x0000000004E00000-0x0000000004E01000-memory.dmp

    Filesize

    4KB

  • memory/648-121-0x00000000050B0000-0x00000000050B1000-memory.dmp

    Filesize

    4KB

  • memory/648-122-0x00000000058E0000-0x00000000058E1000-memory.dmp

    Filesize

    4KB

  • memory/648-123-0x0000000006080000-0x0000000006089000-memory.dmp

    Filesize

    36KB

  • memory/648-124-0x000000007F4C0000-0x000000007F4C1000-memory.dmp

    Filesize

    4KB

  • memory/648-125-0x0000000000C30000-0x0000000000CB2000-memory.dmp

    Filesize

    520KB

  • memory/648-126-0x00000000005B0000-0x00000000005EF000-memory.dmp

    Filesize

    252KB

  • memory/3576-128-0x000000000041CFF0-mapping.dmp

  • memory/3576-127-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/3576-130-0x00000000019A0000-0x0000000001CC0000-memory.dmp

    Filesize

    3.1MB