Resubmissions

12-10-2021 07:59

211012-jvnsvabghq 10

12-10-2021 07:44

211012-jla6dsbge6 10

Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    12-10-2021 07:44

General

  • Target

    xz.exe

  • Size

    163KB

  • MD5

    3b710cc2fd2ed7c2c71e88b128cb1297

  • SHA1

    cde9f5bc3064e6e84473b74c62c289e38db2f00b

  • SHA256

    0c22acaa973cbb781aea92dc1fb5a8c7cc1fd2abd403f2a6b9703f8f1e1c8657

  • SHA512

    a74f820a0e1a6a2db21998109ebba32ffc1abac3fc26eaabb28a891170aa5d5c0b1e893e0a215a0a285dda95bf579e91b00f93cfa8561c882ee1bb4a1faa1c50

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mjyv

C2

http://www.simpeltattofor.men/mjyv/

Decoy

wenyuexuan.com

tropicaldepression.info

healthylifefit.com

reemletenleafy.com

jmrrve.com

mabduh.com

esomvw.com

selfcaresereneneness.com

murdabudz.com

meinemail.online

brandqrcodes.com

live-in-pflege.com

nickrecovery.com

ziototoristorante.com

chatcure.com

corlora.com

localagentlab.com

yogo7.net

krveop.com

heianswer.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\xz.exe
      "C:\Users\Admin\AppData\Local\Temp\xz.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3128
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\xz.exe"
        3⤵
          PID:2920

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1844-117-0x0000000000000000-mapping.dmp
    • memory/1844-119-0x0000000000BC0000-0x0000000000BD3000-memory.dmp
      Filesize

      76KB

    • memory/1844-120-0x00000000004D0000-0x00000000004F9000-memory.dmp
      Filesize

      164KB

    • memory/1844-121-0x0000000004320000-0x0000000004640000-memory.dmp
      Filesize

      3.1MB

    • memory/1844-122-0x0000000004170000-0x0000000004200000-memory.dmp
      Filesize

      576KB

    • memory/2920-118-0x0000000000000000-mapping.dmp
    • memory/3016-116-0x0000000003250000-0x00000000033C6000-memory.dmp
      Filesize

      1.5MB

    • memory/3016-123-0x0000000006920000-0x00000000069B6000-memory.dmp
      Filesize

      600KB

    • memory/3128-114-0x0000000000A20000-0x0000000000D40000-memory.dmp
      Filesize

      3.1MB

    • memory/3128-115-0x00000000009A0000-0x00000000009B1000-memory.dmp
      Filesize

      68KB