Analysis

  • max time kernel
    148s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    05-05-2021 13:20

General

  • Target

    14500.50.Deposit.exe

  • Size

    712KB

  • MD5

    93b2ca391610d14085551d30b9b4dba8

  • SHA1

    55e76c4988018dc93df899e2cda607418325910b

  • SHA256

    6bd5e5d02430922bfce2893c805028ae0374fee203235b379856f8bc5f574a76

  • SHA512

    c5f5f4a69885763a1fb620ff3aedc2abb76d648fe521c30bfdd9577e7e682c9343038db9ea640d6016813cab2c791a4caf1b2fc5bd24ae41cbfc1f70ba5f40a1

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.torontoroots.com/bfos/

Decoy

jananihealthprojects.com

harmonize-your-home.com

hibiscuslingerie.com

mauipotatochips.com

truquedevida.com

motchutwibu.net

transformingyourskills.com

vparh.com

apnauto.com

clearspanai.com

gvcofcj.icu

championcakes.com

instanelson.com

appliedrestoxicol.com

thefamilybrew.com

lagunacrafts.com

aliferecovered.com

eastsolutions.website

theledgesashland.com

vkusomarket.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1200
      • C:\Users\Admin\AppData\Local\Temp\14500.50.Deposit.exe
        "C:\Users\Admin\AppData\Local\Temp\14500.50.Deposit.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:940
        • C:\Users\Admin\AppData\Local\Temp\14500.50.Deposit.exe
          "C:\Users\Admin\AppData\Local\Temp\14500.50.Deposit.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Windows\SysWOW64\NETSTAT.EXE
            "C:\Windows\SysWOW64\NETSTAT.EXE"
            4⤵
            • Suspicious use of SetThreadContext
            • Gathers network information
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:316
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\14500.50.Deposit.exe"
              5⤵
              • Deletes itself
              PID:432

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/316-73-0x0000000000000000-mapping.dmp
    • memory/316-78-0x0000000000A70000-0x0000000000B00000-memory.dmp
      Filesize

      576KB

    • memory/316-77-0x0000000002190000-0x0000000002493000-memory.dmp
      Filesize

      3.0MB

    • memory/316-75-0x0000000000D80000-0x0000000000D89000-memory.dmp
      Filesize

      36KB

    • memory/316-76-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/432-74-0x0000000000000000-mapping.dmp
    • memory/940-64-0x0000000004690000-0x00000000046F2000-memory.dmp
      Filesize

      392KB

    • memory/940-59-0x00000000008A0000-0x00000000008A1000-memory.dmp
      Filesize

      4KB

    • memory/940-63-0x0000000005140000-0x00000000051E7000-memory.dmp
      Filesize

      668KB

    • memory/940-62-0x0000000000290000-0x000000000029E000-memory.dmp
      Filesize

      56KB

    • memory/940-61-0x0000000004D90000-0x0000000004D91000-memory.dmp
      Filesize

      4KB

    • memory/1200-70-0x0000000003D80000-0x0000000003E66000-memory.dmp
      Filesize

      920KB

    • memory/1200-72-0x0000000004ED0000-0x000000000504E000-memory.dmp
      Filesize

      1.5MB

    • memory/1200-79-0x0000000004C20000-0x0000000004DA9000-memory.dmp
      Filesize

      1.5MB

    • memory/1492-68-0x0000000000960000-0x0000000000C63000-memory.dmp
      Filesize

      3.0MB

    • memory/1492-69-0x0000000000220000-0x0000000000231000-memory.dmp
      Filesize

      68KB

    • memory/1492-71-0x00000000002A0000-0x00000000002B1000-memory.dmp
      Filesize

      68KB

    • memory/1492-66-0x000000000041D090-mapping.dmp
    • memory/1492-65-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB