Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    06-05-2021 13:03

General

  • Target

    tgix.exe

  • Size

    1.1MB

  • MD5

    2e3f9f38f7cb188b1f25028061c75724

  • SHA1

    6fcc9441c9738e854d38e21a92a2a211049dc612

  • SHA256

    b356ada562e3300d6a94806979b8920abbae8b40ff9ce89b5f5c2a10e0f970b0

  • SHA512

    046ccf12497f5a63a1033b83ecd0a390e1eb088d9bcb5636163b1bb4b5d4a1b04532c7497a27a18b01a6a70739bb72b211376e99bb3b5572a7ba83766ab75550

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.liancaiwangv5.com/oerg/

Decoy

brightly-common.com

petwellness.pet

oldhamluxury.com

cmpembroidery.com

physicalrobot.com

irynazumba.com

testyourself11.com

theblacksportswoman.com

mottestertraining.agency

confrontinghate.info

tamiigun.com

pod14.club

implementnowsolutions.net

letsdance.website

cashforkeysdz.net

grupoprotecsasac.com

kol-lek-tiv.net

funeralhomesmaroail.com

lwfunding.com

junkglobal.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\tgix.exe
      "C:\Users\Admin\AppData\Local\Temp\tgix.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Users\Admin\AppData\Local\Temp\tgix.exe
        "C:\Users\Admin\AppData\Local\Temp\tgix.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:996
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:568
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\tgix.exe"
        3⤵
        • Deletes itself
        PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/568-71-0x0000000000000000-mapping.dmp
  • memory/568-77-0x00000000021E0000-0x000000000226F000-memory.dmp
    Filesize

    572KB

  • memory/568-75-0x0000000001ED0000-0x00000000021D3000-memory.dmp
    Filesize

    3.0MB

  • memory/568-74-0x0000000000080000-0x00000000000A8000-memory.dmp
    Filesize

    160KB

  • memory/568-73-0x00000000007E0000-0x00000000007FC000-memory.dmp
    Filesize

    112KB

  • memory/996-63-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/996-67-0x0000000000120000-0x0000000000130000-memory.dmp
    Filesize

    64KB

  • memory/996-69-0x00000000001B0000-0x00000000001C0000-memory.dmp
    Filesize

    64KB

  • memory/996-66-0x00000000008E0000-0x0000000000BE3000-memory.dmp
    Filesize

    3.0MB

  • memory/996-64-0x000000000041D050-mapping.dmp
  • memory/1028-60-0x0000000075801000-0x0000000075803000-memory.dmp
    Filesize

    8KB

  • memory/1028-62-0x0000000000411000-0x0000000000412000-memory.dmp
    Filesize

    4KB

  • memory/1028-61-0x0000000000410000-0x0000000000411000-memory.dmp
    Filesize

    4KB

  • memory/1204-68-0x00000000061A0000-0x00000000062E7000-memory.dmp
    Filesize

    1.3MB

  • memory/1204-70-0x0000000006460000-0x00000000065D0000-memory.dmp
    Filesize

    1.4MB

  • memory/1204-78-0x0000000004090000-0x000000000417B000-memory.dmp
    Filesize

    940KB

  • memory/1740-76-0x0000000000000000-mapping.dmp