Analysis

  • max time kernel
    148s
  • max time network
    70s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    28-09-2021 06:20

General

  • Target

    4c70d5b1c63a468f7e0aedf64f93ca42.exe

  • Size

    1024KB

  • MD5

    4c70d5b1c63a468f7e0aedf64f93ca42

  • SHA1

    c248ab00560786b7be23151597d9503a2e84602f

  • SHA256

    83242a0f42be34e66e502e4a3a45d2470f3b24aef8a1d8484711f4439d7fe74a

  • SHA512

    2146f98b4f950555333a00668ab6f71ad2a432b12d12cb0c07cc2dc342884f88b491442c84da763b3101ee7ac89e8c08f6552203ba9470401e934191e4858a8c

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mjyv

C2

http://www.simpeltattofor.men/mjyv/

Decoy

wenyuexuan.com

tropicaldepression.info

healthylifefit.com

reemletenleafy.com

jmrrve.com

mabduh.com

esomvw.com

selfcaresereneneness.com

murdabudz.com

meinemail.online

brandqrcodes.com

live-in-pflege.com

nickrecovery.com

ziototoristorante.com

chatcure.com

corlora.com

localagentlab.com

yogo7.net

krveop.com

heianswer.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe
    "C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:664
    • C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe
      "C:\Users\Admin\AppData\Local\Temp\4c70d5b1c63a468f7e0aedf64f93ca42.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:364

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/364-120-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/364-121-0x000000000041D460-mapping.dmp
  • memory/364-122-0x0000000001580000-0x00000000018A0000-memory.dmp
    Filesize

    3.1MB

  • memory/664-114-0x0000000001030000-0x0000000001031000-memory.dmp
    Filesize

    4KB

  • memory/664-116-0x0000000005050000-0x0000000005051000-memory.dmp
    Filesize

    4KB

  • memory/664-117-0x0000000004B50000-0x0000000004B51000-memory.dmp
    Filesize

    4KB

  • memory/664-118-0x0000000004B40000-0x0000000004B41000-memory.dmp
    Filesize

    4KB

  • memory/664-119-0x00000000009D0000-0x00000000009D1000-memory.dmp
    Filesize

    4KB