Analysis

  • max time kernel
    107s
  • max time network
    109s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    07-10-2021 09:01

General

  • Target

    5ecdf9607af624d3ec1ed2bc9f0e9146.exe

  • Size

    339KB

  • MD5

    5ecdf9607af624d3ec1ed2bc9f0e9146

  • SHA1

    d68079d495932ef242efc76e96fe6d75a1ab8dc0

  • SHA256

    934615bde495d4cbbfd0178c6eea46804cb19a447db1a8781bb43c5986012cbb

  • SHA512

    b7fe77eb6f6fbd620a5a7d187d1355fb43ece505d46846703ea71e84205fb6511867756552202a5b95163cc651a5ab9a14cb1b0c13e50260a5c57993df39835c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p08r

C2

http://www.puremicrodosing.com/p08r/

Decoy

focalstead.com

adult-affi2401.com

tamaracastrillejo.com

klimatika.pro

vineyardsimple.com

maskrgl.com

anamontenegro.website

lockolock.com

lkdgd.com

bgcs.online

tasteofgadsdencounty.com

abbastanza.info

serviciomovistar.online

xaudix.com

flintandfern.com

ranchoptician.com

tradeplay.net

chazuo.store

fb90km.com

americandropper.com

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 10 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
    "C:\Users\Admin\AppData\Local\Temp\5ecdf9607af624d3ec1ed2bc9f0e9146.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:1088
    • C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:1976

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • C:\Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
    MD5

    9e2b9928c89a9d0da1d3e8f4bd96afa7

    SHA1

    ec66cda99f44b62470c6930e5afda061579cde35

    SHA256

    8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

    SHA512

    2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

  • \PROGRA~2\Google\Temp\GUMFBCB.tmp\GOFB2B~1.EXE
    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \PROGRA~2\Google\Update\1335~1.452\GOFB2B~1.EXE
    MD5

    583ff3367e050c4d62bc03516473b40a

    SHA1

    6aa1d26352b78310e711884829c35a69ed1bf0f9

    SHA256

    6b63f8dd47d8b3baa71b6cd205d428861b96bf09cf479071e75ddd23f97c0146

    SHA512

    e9bdd5cc2e29db48cc524488fbadb08e808f17f6e18fa595cfebae229c94f2547079e52a2ada214169577b89b2ffbef424729cd90acdea3774f5c76aec192be0

  • \Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • \Users\Admin\AppData\Local\Temp\3582-490\5ecdf9607af624d3ec1ed2bc9f0e9146.exe
    MD5

    d41f65d9b8b141d40387320ce54f9ac3

    SHA1

    33fea576d37736131811f5c528aa6439ca53ed95

    SHA256

    21350c749a15b06efda33cae533086eab02ef83685d539556407633676de94bb

    SHA512

    5dd5cc2e596cdab2209ecea994739a0c476b869545d2e5446d6f57237b1d6a539de48d407ec065ee9406ca1933104e7db585c59a80ec7933206ead7fc2c73851

  • \Users\Admin\AppData\Local\Temp\nsl788A.tmp\xkbzkendk.dll
    MD5

    78443d8d2652df75871fecb3890f917f

    SHA1

    c44b6f398134befbb76700830deb602453167660

    SHA256

    bb9fc7790c243f818df28e4bd1acfcef303a2391163444daec38edc99b5b39be

    SHA512

    dc30b45af4cac2735edd0953c7197e801d716f4f891611af6b80f16d8b2b2053ca5477a66964cee499d53dc40820ac08796037ba5855c9c521a7cee64dda0a76

  • memory/1088-60-0x0000000075DA1000-0x0000000075DA3000-memory.dmp
    Filesize

    8KB

  • memory/1616-62-0x0000000000000000-mapping.dmp
  • memory/1976-68-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1976-69-0x000000000041D440-mapping.dmp
  • memory/1976-71-0x00000000006F0000-0x00000000009F3000-memory.dmp
    Filesize

    3.0MB