Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    11-05-2021 13:02

General

  • Target

    PO_dated_11.05.2021.pdf.exe

  • Size

    902KB

  • MD5

    21e8676fede4e9e629ac0b0e36a3772a

  • SHA1

    2643fb666f938fbdc0ce81994629a2ad152451af

  • SHA256

    6716f9ca37043f0684164a12c5971f67c738cefb8b8322556d970f60333d72b0

  • SHA512

    e527eec19599469bbecb64f502279a68b969920a3828524fdd455d232b3e9fdb14e4cda89623250ea6483113043ff48fa1fbe72c1b46c9ce5a0992661da00a54

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

C2

http://www.ursulaaubri.com/s5cm/

Decoy

labibmasas.com

puppy-os.com

campingquick.com

bluewavewelding.com

qizhukeji.com

economiemalin.com

tomrings.com

mdduct.com

cloodgame.com

acadiepresse.com

daleradio.net

kampanyalisayfalar.digital

instrumentsets.com

centralcoastcardeals.com

xn--fiqyww2q3xd.xyz

annafelicia.com

vinkle.net

somebodyelsesdesigns.com

thatsohaute.com

gaoxiaoduan.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\PO_dated_11.05.2021.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\PO_dated_11.05.2021.pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:652
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sCTCScVl" /XML "C:\Users\Admin\AppData\Local\Temp\tmp199E.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1248
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:3632
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:1276
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1264
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:916
          • C:\Windows\SysWOW64\control.exe
            "C:\Windows\SysWOW64\control.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3676
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              3⤵
                PID:1004

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Execution

          Scheduled Task

          1
          T1053

          Persistence

          Scheduled Task

          1
          T1053

          Privilege Escalation

          Scheduled Task

          1
          T1053

          Discovery

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\tmp199E.tmp
            MD5

            90ea0ffdb00dbb57f8414f6c5edb5db7

            SHA1

            ef2f88fa789e451356ca231db6194e57fa581790

            SHA256

            897362c8e96231ec02ab6d5a9efb58a340ec1d34395f053161fb6da38e3161ca

            SHA512

            c6252f14bef3afbe102f7afa31acb413b2c5ba6b7acea896e6ae0d0960216557b4ff937d1a586aee6adb7283f7eb30c263b79058f41ebad0dfb47abea8f3db0e

          • memory/652-121-0x0000000002A30000-0x0000000002ACC000-memory.dmp
            Filesize

            624KB

          • memory/652-117-0x00000000055F0000-0x00000000055F1000-memory.dmp
            Filesize

            4KB

          • memory/652-118-0x0000000005190000-0x0000000005191000-memory.dmp
            Filesize

            4KB

          • memory/652-119-0x0000000005100000-0x0000000005101000-memory.dmp
            Filesize

            4KB

          • memory/652-120-0x0000000005350000-0x0000000005351000-memory.dmp
            Filesize

            4KB

          • memory/652-122-0x0000000005330000-0x0000000005334000-memory.dmp
            Filesize

            16KB

          • memory/652-123-0x0000000005FF0000-0x00000000060B8000-memory.dmp
            Filesize

            800KB

          • memory/652-124-0x0000000005550000-0x00000000055D4000-memory.dmp
            Filesize

            528KB

          • memory/652-116-0x0000000005030000-0x0000000005031000-memory.dmp
            Filesize

            4KB

          • memory/652-114-0x0000000000750000-0x0000000000751000-memory.dmp
            Filesize

            4KB

          • memory/1004-139-0x0000000000000000-mapping.dmp
          • memory/1248-125-0x0000000000000000-mapping.dmp
          • memory/1264-128-0x000000000041D000-mapping.dmp
          • memory/1264-130-0x0000000001150000-0x0000000001470000-memory.dmp
            Filesize

            3.1MB

          • memory/1264-131-0x0000000000BA0000-0x0000000000BB0000-memory.dmp
            Filesize

            64KB

          • memory/1264-133-0x00000000014B0000-0x00000000014C0000-memory.dmp
            Filesize

            64KB

          • memory/1264-127-0x0000000000400000-0x0000000000428000-memory.dmp
            Filesize

            160KB

          • memory/3052-132-0x0000000005C80000-0x0000000005E02000-memory.dmp
            Filesize

            1.5MB

          • memory/3052-134-0x0000000005E10000-0x0000000005F7E000-memory.dmp
            Filesize

            1.4MB

          • memory/3052-141-0x0000000006270000-0x00000000063FF000-memory.dmp
            Filesize

            1.6MB

          • memory/3676-135-0x0000000000000000-mapping.dmp
          • memory/3676-136-0x0000000001220000-0x0000000001240000-memory.dmp
            Filesize

            128KB

          • memory/3676-137-0x00000000005B0000-0x00000000005D8000-memory.dmp
            Filesize

            160KB

          • memory/3676-138-0x00000000047E0000-0x0000000004B00000-memory.dmp
            Filesize

            3.1MB

          • memory/3676-140-0x00000000010A0000-0x000000000112F000-memory.dmp
            Filesize

            572KB