Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    23-10-2021 07:43

General

  • Target

    0f829c2b.exe

  • Size

    395KB

  • MD5

    262b2ede4b3d2200a6a872d56b01b977

  • SHA1

    0e05ff778e66af0955704da33db40bc72748b8c9

  • SHA256

    0f829c2b93c955c1387a08ff4b7c220f04170ab7e224e7907e2b7e76aa5ef99e

  • SHA512

    f6fbfee872623b38d956fe90b054585f9b62b42b553ec18180b0f65ee62cd190ad04fd75227088a944991b44948ea051c2cfc5fdbe5e280eb9d6f3d2731629ca

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ujaz

C2

http://www.zurnwater.com/ujaz/

Decoy

thehastyeinstitute.com

xisougou.com

binbin-ads.com

cellosalepage.com

tentarteconessen.com

easy-cleaner.com

product-review.club

techdigital.global

bitchesheartpickles.com

thekissclubltd.com

kryptoxchange.net

eighthundredthousand.info

companyintelapp.com

newswit.xyz

davidlissoni.com

lapassionara.com

energistichealth.com

av1tv.com

caofuqi.com

beatniq-scasset.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2792
    • C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe
      "C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe
        "C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe"
        3⤵
          PID:584
        • C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe
          "C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3888
      • C:\Windows\SysWOW64\chkdsk.exe
        "C:\Windows\SysWOW64\chkdsk.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2964
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\0f829c2b.exe"
          3⤵
            PID:2812

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1324-117-0x00000000057F0000-0x00000000057F1000-memory.dmp
        Filesize

        4KB

      • memory/1324-118-0x0000000005220000-0x0000000005221000-memory.dmp
        Filesize

        4KB

      • memory/1324-119-0x00000000052F0000-0x00000000057EE000-memory.dmp
        Filesize

        5.0MB

      • memory/1324-120-0x0000000005210000-0x0000000005211000-memory.dmp
        Filesize

        4KB

      • memory/1324-121-0x0000000007740000-0x0000000007741000-memory.dmp
        Filesize

        4KB

      • memory/1324-122-0x0000000005570000-0x000000000557A000-memory.dmp
        Filesize

        40KB

      • memory/1324-123-0x0000000007AE0000-0x0000000007B2C000-memory.dmp
        Filesize

        304KB

      • memory/1324-115-0x0000000000840000-0x0000000000841000-memory.dmp
        Filesize

        4KB

      • memory/2792-129-0x0000000002D70000-0x0000000002E4B000-memory.dmp
        Filesize

        876KB

      • memory/2792-136-0x0000000005720000-0x0000000005842000-memory.dmp
        Filesize

        1.1MB

      • memory/2812-133-0x0000000000000000-mapping.dmp
      • memory/2964-132-0x0000000000990000-0x00000000009B9000-memory.dmp
        Filesize

        164KB

      • memory/2964-130-0x0000000000000000-mapping.dmp
      • memory/2964-131-0x0000000001180000-0x000000000118A000-memory.dmp
        Filesize

        40KB

      • memory/2964-134-0x00000000054D0000-0x00000000057F0000-memory.dmp
        Filesize

        3.1MB

      • memory/2964-135-0x0000000005220000-0x00000000052B0000-memory.dmp
        Filesize

        576KB

      • memory/3888-127-0x00000000011F0000-0x0000000001510000-memory.dmp
        Filesize

        3.1MB

      • memory/3888-128-0x00000000010F0000-0x0000000001101000-memory.dmp
        Filesize

        68KB

      • memory/3888-125-0x000000000041D400-mapping.dmp
      • memory/3888-124-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB