QUOTQTION.zip

General
Target

QUOTQTION.exe

Filesize

866KB

Completed

24-09-2021 10:22

Score
10 /10
MD5

24736913b455be2ed3d1cc67c767afc4

SHA1

8026db0f265178cf013ac579c1b7267f4014bf2c

SHA256

a109f0b9407728fef1b41d766e8228085ee04661156d84ef543777bf311f450b

Malware Config

Extracted

Family xloader
Version 2.5
Campaign c2ue
C2

http://www.heidevelop.xyz/c2ue/

Decoy

isportdata.com

stellarex.energy

hsucollections.com

menuhaisan.com

joe-tzu.com

lumichargemktg.com

uae.tires

rapidcae.com

softwaresystemsolutions.com

s-galaxy.website

daewon-talks.net

northgamesnetwork.com

catalogue-bouyguestele.com

criativanet.com

theseasonalshift.com

actionfoto.online

openmaildoe.com

trashpenguin.com

ennopure.net

azurermine.com

wingkingtong.com

innovativepropsolutions.com

transportesajusco.online

rosenblasts.info

ttsports.store

servpix.com

liveatthebiltmore.com

magentautil.com

aquolly.com

collabsales.com

bredaslo.com

suddisaddu.com

www920011a.com

uudh.info

bleuexpress.com

xivuko.com

upstatehvacpros.com

acami.art

thqahql.com

mauzabe.com

mydrones.net

franciseshun.com

nrrpri.com

adndpanel.xyz

straightcorndinner.xyz

locngrip.com

wgylab.xyz

greenmamba100.com

dmglobalconsult.net

alissanoume.xyz

Signatures 9

Filter: none

  • Xloader

    Description

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    Description

    suricata: ET MALWARE FormBook CnC Checkin (GET)

    Tags

  • Xloader Payload

    Tags

    Reported IOCs

    resourceyara_rule
    behavioral2/memory/4184-127-0x0000000000400000-0x0000000000429000-memory.dmpxloader
    behavioral2/memory/4184-128-0x000000000041D3A0-mapping.dmpxloader
    behavioral2/memory/2376-134-0x0000000002A60000-0x0000000002A89000-memory.dmpxloader
  • Suspicious use of SetThreadContext
    QUOTQTION.exeQUOTQTION.exerundll32.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 376 set thread context of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 4184 set thread context of 25524184QUOTQTION.exeExplorer.EXE
    PID 2376 set thread context of 25522376rundll32.exeExplorer.EXE
  • Suspicious behavior: EnumeratesProcesses
    QUOTQTION.exeQUOTQTION.exerundll32.exe

    Reported IOCs

    pidprocess
    376QUOTQTION.exe
    376QUOTQTION.exe
    376QUOTQTION.exe
    376QUOTQTION.exe
    376QUOTQTION.exe
    376QUOTQTION.exe
    4184QUOTQTION.exe
    4184QUOTQTION.exe
    4184QUOTQTION.exe
    4184QUOTQTION.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
    2376rundll32.exe
  • Suspicious behavior: GetForegroundWindowSpam
    Explorer.EXE

    Reported IOCs

    pidprocess
    2552Explorer.EXE
  • Suspicious behavior: MapViewOfSection
    QUOTQTION.exerundll32.exe

    Reported IOCs

    pidprocess
    4184QUOTQTION.exe
    4184QUOTQTION.exe
    4184QUOTQTION.exe
    2376rundll32.exe
    2376rundll32.exe
  • Suspicious use of AdjustPrivilegeToken
    QUOTQTION.exeQUOTQTION.exerundll32.exe

    Reported IOCs

    descriptionpidprocess
    Token: SeDebugPrivilege376QUOTQTION.exe
    Token: SeDebugPrivilege4184QUOTQTION.exe
    Token: SeDebugPrivilege2376rundll32.exe
  • Suspicious use of WriteProcessMemory
    QUOTQTION.exeExplorer.EXErundll32.exe

    Reported IOCs

    descriptionpidprocesstarget process
    PID 376 wrote to memory of 3804376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 3804376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 3804376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4180376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4180376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4180376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4176376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4176376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4176376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 376 wrote to memory of 4184376QUOTQTION.exeQUOTQTION.exe
    PID 2552 wrote to memory of 23762552Explorer.EXErundll32.exe
    PID 2552 wrote to memory of 23762552Explorer.EXErundll32.exe
    PID 2552 wrote to memory of 23762552Explorer.EXErundll32.exe
    PID 2376 wrote to memory of 33962376rundll32.execmd.exe
    PID 2376 wrote to memory of 33962376rundll32.execmd.exe
    PID 2376 wrote to memory of 33962376rundll32.execmd.exe
Processes 8
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    Suspicious behavior: GetForegroundWindowSpam
    Suspicious use of WriteProcessMemory
    PID:2552
    • C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe
      "C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe"
      Suspicious use of SetThreadContext
      Suspicious behavior: EnumeratesProcesses
      Suspicious use of AdjustPrivilegeToken
      Suspicious use of WriteProcessMemory
      PID:376
      • C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe
        "{path}"
        PID:3804
      • C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe
        "{path}"
        PID:4180
      • C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe
        "{path}"
        PID:4176
      • C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe
        "{path}"
        Suspicious use of SetThreadContext
        Suspicious behavior: EnumeratesProcesses
        Suspicious behavior: MapViewOfSection
        Suspicious use of AdjustPrivilegeToken
        PID:4184
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      Suspicious use of SetThreadContext
      Suspicious behavior: EnumeratesProcesses
      Suspicious behavior: MapViewOfSection
      Suspicious use of AdjustPrivilegeToken
      Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\QUOTQTION.exe"
        PID:3396
Network
MITRE ATT&CK Matrix
Collection
    Command and Control
      Credential Access
        Defense Evasion
          Discovery
            Execution
              Exfiltration
                Impact
                  Initial Access
                    Lateral Movement
                      Persistence
                        Privilege Escalation
                          Replay Monitor
                          00:00 00:00
                          Downloads
                          • memory/376-115-0x0000000000A10000-0x0000000000A11000-memory.dmp

                          • memory/376-117-0x0000000005330000-0x0000000005331000-memory.dmp

                          • memory/376-118-0x00000000058D0000-0x00000000058D1000-memory.dmp

                          • memory/376-119-0x0000000005470000-0x0000000005471000-memory.dmp

                          • memory/376-120-0x00000000052F0000-0x00000000052F1000-memory.dmp

                          • memory/376-121-0x00000000055D0000-0x00000000055D1000-memory.dmp

                          • memory/376-122-0x0000000005300000-0x0000000005301000-memory.dmp

                          • memory/376-123-0x0000000005DD0000-0x0000000005DD1000-memory.dmp

                          • memory/376-124-0x0000000004D00000-0x0000000004D0E000-memory.dmp

                          • memory/376-125-0x000000000A4A0000-0x000000000A519000-memory.dmp

                          • memory/376-126-0x000000000A540000-0x000000000A56B000-memory.dmp

                          • memory/2376-133-0x0000000000390000-0x00000000003A3000-memory.dmp

                          • memory/2376-137-0x00000000044F0000-0x0000000004580000-memory.dmp

                          • memory/2376-135-0x00000000046B0000-0x00000000049D0000-memory.dmp

                          • memory/2376-134-0x0000000002A60000-0x0000000002A89000-memory.dmp

                          • memory/2376-132-0x0000000000000000-mapping.dmp

                          • memory/2552-131-0x0000000005330000-0x0000000005498000-memory.dmp

                          • memory/2552-138-0x0000000002D70000-0x0000000002E4A000-memory.dmp

                          • memory/3396-136-0x0000000000000000-mapping.dmp

                          • memory/4184-129-0x0000000001670000-0x0000000001990000-memory.dmp

                          • memory/4184-130-0x00000000019B0000-0x00000000019C1000-memory.dmp

                          • memory/4184-128-0x000000000041D3A0-mapping.dmp

                          • memory/4184-127-0x0000000000400000-0x0000000000429000-memory.dmp