Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    24-09-2021 08:13

General

  • Target

    NEW ORDER RE PO88224.PDF.exe

  • Size

    465KB

  • MD5

    a88e3833ee5ccb2434ee90aa645a8894

  • SHA1

    b6e78de80bbdc7748dfcbea47bc43593b587b075

  • SHA256

    4dfab25d3ccff9a33396c252590c27c57f23f9a94b11ebd9834b23981b0908e6

  • SHA512

    becf2614d5196c2b43f74c94f76cc0e9e21ffc75edd8a3ec8057a01ed9e8cfce755590228174692e4935861406627f7048fcf0294007b62148c5ece9f065af77

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ny9y

C2

http://www.caddomain.com/ny9y/

Decoy

prelovedboutiqe.com

zhantool.com

grypeguidgorge.com

aa6588.com

privateerspacecompany.space

phil-goodman.com

jckabogados.com

familybeautifull.com

probinns.com

angelika-fritz.online

mygeeb.com

481344.com

freesoft.pro

extracter.store

fasxpay.com

hnjxcd.com

wfot2002.com

worldexecutor.com

tongxintachangjia.com

zachtippit.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 10 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\NEW ORDER RE PO88224.PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\NEW ORDER RE PO88224.PDF.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4060
      • C:\Users\Admin\AppData\Local\Temp\NEW ORDER RE PO88224.PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\NEW ORDER RE PO88224.PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3960
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:836
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER RE PO88224.PDF.exe"
        3⤵
          PID:1224

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/836-136-0x0000000005280000-0x0000000005310000-memory.dmp
      Filesize

      576KB

    • memory/836-135-0x0000000005610000-0x0000000005930000-memory.dmp
      Filesize

      3.1MB

    • memory/836-133-0x0000000000980000-0x000000000098A000-memory.dmp
      Filesize

      40KB

    • memory/836-134-0x0000000004D10000-0x0000000004D39000-memory.dmp
      Filesize

      164KB

    • memory/836-131-0x0000000000000000-mapping.dmp
    • memory/1224-132-0x0000000000000000-mapping.dmp
    • memory/3016-128-0x0000000005840000-0x000000000599B000-memory.dmp
      Filesize

      1.4MB

    • memory/3016-137-0x0000000006AA0000-0x0000000006BEA000-memory.dmp
      Filesize

      1.3MB

    • memory/3016-130-0x00000000059A0000-0x0000000005AE3000-memory.dmp
      Filesize

      1.3MB

    • memory/3960-129-0x0000000001440000-0x0000000001451000-memory.dmp
      Filesize

      68KB

    • memory/3960-125-0x000000000041D470-mapping.dmp
    • memory/3960-127-0x0000000001400000-0x0000000001411000-memory.dmp
      Filesize

      68KB

    • memory/3960-126-0x00000000010E0000-0x0000000001400000-memory.dmp
      Filesize

      3.1MB

    • memory/3960-124-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/4060-122-0x0000000007400000-0x0000000007468000-memory.dmp
      Filesize

      416KB

    • memory/4060-114-0x0000000000150000-0x0000000000151000-memory.dmp
      Filesize

      4KB

    • memory/4060-123-0x0000000007470000-0x00000000074A8000-memory.dmp
      Filesize

      224KB

    • memory/4060-121-0x00000000050D0000-0x00000000050D4000-memory.dmp
      Filesize

      16KB

    • memory/4060-120-0x0000000006F70000-0x0000000006F71000-memory.dmp
      Filesize

      4KB

    • memory/4060-119-0x0000000004A90000-0x0000000004B22000-memory.dmp
      Filesize

      584KB

    • memory/4060-118-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
      Filesize

      4KB

    • memory/4060-117-0x0000000004B30000-0x0000000004B31000-memory.dmp
      Filesize

      4KB

    • memory/4060-116-0x0000000005140000-0x0000000005141000-memory.dmp
      Filesize

      4KB