Analysis

  • max time kernel
    150s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-en
  • submitted
    05-09-2021 06:09

General

  • Target

    POSH service quotation..exe

  • Size

    548KB

  • MD5

    38f0e944212962eca78d2209e614aa41

  • SHA1

    7b638710352c0374f41374bde07aa2d57263e8f1

  • SHA256

    2579540806631bf43383d340bf445855f71106614b40854ca9cf33265a24f900

  • SHA512

    3a1178bcf072d554c3c758cf2a4f3a083e027069f2d3c13d55a0e27162a14822ce0ecb5c526b27e1d281c995a6d617cf0c27359f9c23a2a433b1afcf8f12ad96

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n58i

C2

http://www.mack3sleeve.com/n58i/

Decoy

nl-cafe.com

votetedjaleta.com

britrobertsrealtor.com

globipark.com

citysucces.com

verisignwebsite-verified.com

riddlepc.com

rosecityclimbing.com

oleandrinextract.com

salmankonstruksi.com

needhamchannel.com

refreshx2z.com

youth66.com

pla-russia.com

halloweenmaskpro.com

exdysis.com

1gcz.com

lookgoodman.com

rlxagva.com

stlcityc.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\POSH service quotation..exe
      "C:\Users\Admin\AppData\Local\Temp\POSH service quotation..exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1356
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:1368

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1356-63-0x00000000003A0000-0x00000000003B1000-memory.dmp
      Filesize

      68KB

    • memory/1356-58-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1356-59-0x000000000041D070-mapping.dmp
    • memory/1356-61-0x0000000000270000-0x0000000000281000-memory.dmp
      Filesize

      68KB

    • memory/1356-60-0x0000000000820000-0x0000000000B23000-memory.dmp
      Filesize

      3.0MB

    • memory/1368-68-0x0000000000000000-mapping.dmp
    • memory/1392-62-0x0000000006CE0000-0x0000000006E30000-memory.dmp
      Filesize

      1.3MB

    • memory/1392-71-0x0000000006E30000-0x0000000006F93000-memory.dmp
      Filesize

      1.4MB

    • memory/1392-64-0x0000000004380000-0x0000000004472000-memory.dmp
      Filesize

      968KB

    • memory/1680-65-0x0000000000000000-mapping.dmp
    • memory/1680-67-0x0000000000070000-0x0000000000099000-memory.dmp
      Filesize

      164KB

    • memory/1680-66-0x0000000000E20000-0x0000000000E42000-memory.dmp
      Filesize

      136KB

    • memory/1680-69-0x0000000002250000-0x0000000002553000-memory.dmp
      Filesize

      3.0MB

    • memory/1680-70-0x0000000000980000-0x0000000000A10000-memory.dmp
      Filesize

      576KB

    • memory/2008-57-0x0000000005120000-0x0000000005152000-memory.dmp
      Filesize

      200KB

    • memory/2008-56-0x0000000004B90000-0x0000000004BF7000-memory.dmp
      Filesize

      412KB

    • memory/2008-52-0x0000000000290000-0x0000000000291000-memory.dmp
      Filesize

      4KB

    • memory/2008-55-0x00000000004F0000-0x0000000000506000-memory.dmp
      Filesize

      88KB

    • memory/2008-54-0x0000000004CA0000-0x0000000004CA1000-memory.dmp
      Filesize

      4KB