Resubmissions

27-09-2021 05:05

210927-fq82faffgl 10

21-09-2021 13:32

210921-qsyzcshfd6 10

Analysis

  • max time kernel
    402s
  • max time network
    387s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    27-09-2021 05:05

General

  • Target

    f92898079644c77d76a03ad969332f03.exe

  • Size

    579KB

  • MD5

    f92898079644c77d76a03ad969332f03

  • SHA1

    4dfda3116b95639ce0e6afd68a433f12262e2617

  • SHA256

    e911d332af82b2e6fe66b7d2df23b5a9ba0443ea8f83500ae17c6af1f65d401b

  • SHA512

    cc514da892c3bba8b868279d7b1fc06d158662066130cddf67d5b753a7dc20789a31168b7a4a485f49b115f29081d9e396446bbb6325fde7ea7cf3e88f449663

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.4

Campaign

uytf

C2

http://www.fasilitatortoefl.com/uytf/

Decoy

estherestates.online

babyballetwigan.com

ignorantrough.xyz

moominmamalog.com

pasticcerialemmi.com

orangstyle.com

oldwaterfordfarm.com

aiiqiuwnsas.com

youindependents.com

runbank.net

phytolipshine.com

almedmedicalcenter.com

czxzsa.com

yummyblockparty.com

gadgetinfo.info

cloudfolderplayer.com

chowding.com

xn--tarzmbu-ufb.com

danielaasab.com

dreampropertiesluxury.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f92898079644c77d76a03ad969332f03.exe
    "C:\Users\Admin\AppData\Local\Temp\f92898079644c77d76a03ad969332f03.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1080
    • C:\Users\Admin\AppData\Local\Temp\f92898079644c77d76a03ad969332f03.exe
      "C:\Users\Admin\AppData\Local\Temp\f92898079644c77d76a03ad969332f03.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:788

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/788-59-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/788-60-0x000000000041D520-mapping.dmp
  • memory/788-61-0x0000000000BD0000-0x0000000000ED3000-memory.dmp
    Filesize

    3.0MB

  • memory/1080-53-0x0000000000B30000-0x0000000000B31000-memory.dmp
    Filesize

    4KB

  • memory/1080-55-0x0000000004D20000-0x0000000004D21000-memory.dmp
    Filesize

    4KB

  • memory/1080-56-0x00000000005C0000-0x00000000005DD000-memory.dmp
    Filesize

    116KB

  • memory/1080-57-0x0000000005030000-0x000000000508C000-memory.dmp
    Filesize

    368KB

  • memory/1080-58-0x00000000007C0000-0x00000000007EC000-memory.dmp
    Filesize

    176KB