Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    30-04-2021 13:09

General

  • Target

    PO#10244.exe

  • Size

    717KB

  • MD5

    c4192fc5d072aff733b9c9e3b5d165da

  • SHA1

    2c4e6cae1c3ef562452cc4e6caebd6f5511bc11a

  • SHA256

    a42564801d666f9a210723ee247df72d71d93274e7556920957d5a98b237ab2c

  • SHA512

    c59d51540089ddd00309e328620f11386326c1687a8f2e2318e42f2fbda93d66a0153d5493971ce7eee8f624a61ef52295e729438f1d41289a393ada9f4b3613

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.hysjs168.com/uv34/

Decoy

lattakia-imbiss.com

helenafinaltouch.com

yogamays.com

habangli.com

embraceblm.com

freeurlsite.com

szxanpet.com

inspirationalsblog.com

calibratefirearms.net

chelseashalza.com

ihdeuruim.com

symbolofsafety.com

albanyhumanesociety.net

exclusiveoffer.bet

888yuntu.com

maraitime.com

caletaexperience.com

dreamlikeliving.com

wolvesmito.club

zbyunjin.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\PO#10244.exe
      "C:\Users\Admin\AppData\Local\Temp\PO#10244.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3924
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1196
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2084
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:2340

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1196-127-0x000000000041CFC0-mapping.dmp
    • memory/1196-130-0x0000000000FF0000-0x0000000001000000-memory.dmp
      Filesize

      64KB

    • memory/1196-129-0x0000000001910000-0x0000000001C30000-memory.dmp
      Filesize

      3.1MB

    • memory/1196-126-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/2084-137-0x0000000004AD0000-0x0000000004B5F000-memory.dmp
      Filesize

      572KB

    • memory/2084-136-0x0000000004C80000-0x0000000004FA0000-memory.dmp
      Filesize

      3.1MB

    • memory/2084-133-0x0000000000F20000-0x0000000000F47000-memory.dmp
      Filesize

      156KB

    • memory/2084-134-0x0000000000C00000-0x0000000000C28000-memory.dmp
      Filesize

      160KB

    • memory/2084-132-0x0000000000000000-mapping.dmp
    • memory/2340-135-0x0000000000000000-mapping.dmp
    • memory/3052-138-0x0000000002E80000-0x0000000002F2C000-memory.dmp
      Filesize

      688KB

    • memory/3052-131-0x0000000000F80000-0x0000000001031000-memory.dmp
      Filesize

      708KB

    • memory/3924-120-0x0000000007430000-0x0000000007431000-memory.dmp
      Filesize

      4KB

    • memory/3924-125-0x0000000002520000-0x0000000002551000-memory.dmp
      Filesize

      196KB

    • memory/3924-124-0x0000000000C00000-0x0000000000C78000-memory.dmp
      Filesize

      480KB

    • memory/3924-122-0x00000000070D0000-0x000000000716C000-memory.dmp
      Filesize

      624KB

    • memory/3924-123-0x000000007F9A0000-0x000000007F9A1000-memory.dmp
      Filesize

      4KB

    • memory/3924-121-0x0000000007D60000-0x0000000007D6D000-memory.dmp
      Filesize

      52KB

    • memory/3924-114-0x00000000003A0000-0x00000000003A1000-memory.dmp
      Filesize

      4KB

    • memory/3924-119-0x0000000007150000-0x0000000007151000-memory.dmp
      Filesize

      4KB

    • memory/3924-118-0x0000000007210000-0x0000000007211000-memory.dmp
      Filesize

      4KB

    • memory/3924-117-0x0000000007710000-0x0000000007711000-memory.dmp
      Filesize

      4KB

    • memory/3924-116-0x0000000007170000-0x0000000007171000-memory.dmp
      Filesize

      4KB