Analysis

  • max time kernel
    148s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    28-09-2021 06:20

General

  • Target

    4c70d5b1c63a468f7e0aedf64f93ca42.exe

  • Size

    1024KB

  • MD5

    4c70d5b1c63a468f7e0aedf64f93ca42

  • SHA1

    c248ab00560786b7be23151597d9503a2e84602f

  • SHA256

    83242a0f42be34e66e502e4a3a45d2470f3b24aef8a1d8484711f4439d7fe74a

  • SHA512

    2146f98b4f950555333a00668ab6f71ad2a432b12d12cb0c07cc2dc342884f88b491442c84da763b3101ee7ac89e8c08f6552203ba9470401e934191e4858a8c

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mjyv

C2

http://www.simpeltattofor.men/mjyv/

Decoy

wenyuexuan.com

tropicaldepression.info

healthylifefit.com

reemletenleafy.com

jmrrve.com

mabduh.com

esomvw.com

selfcaresereneneness.com

murdabudz.com

meinemail.online

brandqrcodes.com

live-in-pflege.com

nickrecovery.com

ziototoristorante.com

chatcure.com

corlora.com

localagentlab.com

yogo7.net

krveop.com

heianswer.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe
    "C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1768
    • C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe
      "C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2032

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1768-54-0x0000000000BA0000-0x0000000000BA1000-memory.dmp
    Filesize

    4KB

  • memory/1768-56-0x0000000004CB0000-0x0000000004CB1000-memory.dmp
    Filesize

    4KB

  • memory/2032-58-0x000000000041D460-mapping.dmp
  • memory/2032-59-0x0000000000070000-0x0000000000099000-memory.dmp
    Filesize

    164KB

  • memory/2032-60-0x0000000000880000-0x0000000000B83000-memory.dmp
    Filesize

    3.0MB