Analysis

  • max time kernel
    144s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    06-10-2021 10:18

General

  • Target

    934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe

  • Size

    339KB

  • MD5

    5ecdf9607af624d3ec1ed2bc9f0e9146

  • SHA1

    d68079d495932ef242efc76e96fe6d75a1ab8dc0

  • SHA256

    934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb

  • SHA512

    b7fe77eb6f6fbd620a5a7d187d1355fb43ece505d46846703ea71e84205fb6511867756552202a5b95163cc651a5ab9a14cb1b0c13e50260a5c57993df39835c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p08r

C2

http://www.puremicrodosing.com/p08r/

Decoy

focalstead.com

adult-affi2401.com

tamaracastrillejo.com

klimatika.pro

vineyardsimple.com

maskrgl.com

anamontenegro.website

lockolock.com

lkdgd.com

bgcs.online

tasteofgadsdencounty.com

abbastanza.info

serviciomovistar.online

xaudix.com

flintandfern.com

ranchoptician.com

tradeplay.net

chazuo.store

fb90km.com

americandropper.com

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe
    "C:\Users\Admin\AppData\Local\Temp\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:4076
    • C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3340
      • C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:3452

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • C:\Users\Admin\AppData\Local\Temp\3582-490\934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • \Users\Admin\AppData\Local\Temp\nsw8B01.tmp\xkbzkendk.dll
    MD5

    78443d8d2652df75871fecb3890f917f

    SHA1

    c44b6f398134befbb76700830deb602453167660

    SHA256

    bb9fc7790c243f818df28e4bd1acfcef303a2391163444daec38edc99b5b39be

    SHA512

    dc30b45af4cac2735edd0953c7197e801d716f4f891611af6b80f16d8b2b2053ca5477a66964cee499d53dc40820ac08796037ba5855c9c521a7cee64dda0a76

  • memory/3340-115-0x0000000000000000-mapping.dmp
  • memory/3452-119-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/3452-120-0x000000000041D440-mapping.dmp
  • memory/3452-122-0x00000000009B0000-0x0000000000CD0000-memory.dmp
    Filesize

    3.1MB