Analysis

  • max time kernel
    152s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    06-05-2021 14:04

General

  • Target

    tgix.exe

  • Size

    1.1MB

  • MD5

    2e3f9f38f7cb188b1f25028061c75724

  • SHA1

    6fcc9441c9738e854d38e21a92a2a211049dc612

  • SHA256

    b356ada562e3300d6a94806979b8920abbae8b40ff9ce89b5f5c2a10e0f970b0

  • SHA512

    046ccf12497f5a63a1033b83ecd0a390e1eb088d9bcb5636163b1bb4b5d4a1b04532c7497a27a18b01a6a70739bb72b211376e99bb3b5572a7ba83766ab75550

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.liancaiwangv5.com/oerg/

Decoy

brightly-common.com

petwellness.pet

oldhamluxury.com

cmpembroidery.com

physicalrobot.com

irynazumba.com

testyourself11.com

theblacksportswoman.com

mottestertraining.agency

confrontinghate.info

tamiigun.com

pod14.club

implementnowsolutions.net

letsdance.website

cashforkeysdz.net

grupoprotecsasac.com

kol-lek-tiv.net

funeralhomesmaroail.com

lwfunding.com

junkglobal.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\tgix.exe
      "C:\Users\Admin\AppData\Local\Temp\tgix.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Users\Admin\AppData\Local\Temp\tgix.exe
        "C:\Users\Admin\AppData\Local\Temp\tgix.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1504
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\tgix.exe"
        3⤵
        • Deletes itself
        PID:1468

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/372-69-0x0000000000000000-mapping.dmp
  • memory/372-75-0x0000000000A60000-0x0000000000AEF000-memory.dmp
    Filesize

    572KB

  • memory/372-73-0x0000000002300000-0x0000000002603000-memory.dmp
    Filesize

    3.0MB

  • memory/372-72-0x0000000000080000-0x00000000000A8000-memory.dmp
    Filesize

    160KB

  • memory/372-71-0x0000000000EF0000-0x0000000000EFD000-memory.dmp
    Filesize

    52KB

  • memory/1200-76-0x0000000006130000-0x00000000061F5000-memory.dmp
    Filesize

    788KB

  • memory/1200-68-0x0000000004A30000-0x0000000004B6D000-memory.dmp
    Filesize

    1.2MB

  • memory/1468-70-0x0000000000000000-mapping.dmp
  • memory/1504-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/1504-67-0x0000000000080000-0x0000000000090000-memory.dmp
    Filesize

    64KB

  • memory/1504-66-0x0000000000850000-0x0000000000B53000-memory.dmp
    Filesize

    3.0MB

  • memory/1504-64-0x000000000041D050-mapping.dmp
  • memory/1840-60-0x00000000757C1000-0x00000000757C3000-memory.dmp
    Filesize

    8KB

  • memory/1840-62-0x0000000000C51000-0x0000000000C52000-memory.dmp
    Filesize

    4KB

  • memory/1840-61-0x0000000000C50000-0x0000000000C51000-memory.dmp
    Filesize

    4KB