Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    25-10-2021 09:18

General

  • Target

    ??__ ? __ ?????__ ??? __ ...pdf.....exe

  • Size

    395KB

  • MD5

    b68d6bb055b0fb1367900eaee876dd20

  • SHA1

    46721ae469d81070727744a16f02d8c88144e99f

  • SHA256

    b0fe839ee84678c067828ee5d5d48a30e2588c4a29fd9402609a335fe667c91d

  • SHA512

    890f7cf60b16ed5d7edb935fb5e2c4a4397751e67e01654d09022a45290fd7d46f24786be99af3bc99a9964458be757d82756c074cd07d032197c27cb00b6e9e

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

s86j

C2

http://www.emboldenlife.net/s86j/

Decoy

getlumichargeserver.com

act-vitaalcoach.store

craftgeekz.com

monetflowerfarm.com

morakotislandrealty.com

onlineastrologeruk.com

evvpsml.com

hnbtc.net

auxiliacapitalpartnersllc.com

rdwoodworksstore.com

shulwinfitness.com

arterialhealthgrids.com

cryptork.biz

solomini-tech.com

porttownsendapartments.com

poprumor.com

assetsauctioneer.com

electronics2anyone.com

upskillpme.online

247fooddelivery.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe
      "C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2636
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\uEZCQueLPHvB" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4458.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:3952
      • C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe
        "C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe"
        3⤵
          PID:1576
        • C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe
          "C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe"
          3⤵
            PID:792
          • C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe
            "C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe"
            3⤵
              PID:2196
            • C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe
              "C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe"
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4084
          • C:\Windows\SysWOW64\wlanext.exe
            "C:\Windows\SysWOW64\wlanext.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2828
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\____ _ __ _______ ___ __ ...pdf.....exe"
              3⤵
                PID:1368

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1368-132-0x0000000000000000-mapping.dmp
          • memory/2636-121-0x00000000077B0000-0x00000000077B7000-memory.dmp
            Filesize

            28KB

          • memory/2636-118-0x0000000007980000-0x0000000007981000-memory.dmp
            Filesize

            4KB

          • memory/2636-119-0x0000000007340000-0x00000000073D2000-memory.dmp
            Filesize

            584KB

          • memory/2636-120-0x00000000077D0000-0x00000000077D1000-memory.dmp
            Filesize

            4KB

          • memory/2636-115-0x0000000000500000-0x0000000000501000-memory.dmp
            Filesize

            4KB

          • memory/2636-122-0x0000000008020000-0x0000000008021000-memory.dmp
            Filesize

            4KB

          • memory/2636-123-0x0000000007FD0000-0x000000000801B000-memory.dmp
            Filesize

            300KB

          • memory/2636-117-0x00000000073E0000-0x00000000073E1000-memory.dmp
            Filesize

            4KB

          • memory/2828-135-0x0000000002C30000-0x0000000002F50000-memory.dmp
            Filesize

            3.1MB

          • memory/2828-131-0x0000000000000000-mapping.dmp
          • memory/2828-133-0x0000000000060000-0x0000000000077000-memory.dmp
            Filesize

            92KB

          • memory/2828-134-0x0000000002840000-0x0000000002869000-memory.dmp
            Filesize

            164KB

          • memory/2828-136-0x0000000002A00000-0x0000000002A90000-memory.dmp
            Filesize

            576KB

          • memory/3020-137-0x00000000024C0000-0x000000000258A000-memory.dmp
            Filesize

            808KB

          • memory/3020-130-0x0000000005E40000-0x0000000005F79000-memory.dmp
            Filesize

            1.2MB

          • memory/3952-124-0x0000000000000000-mapping.dmp
          • memory/4084-129-0x0000000000E80000-0x0000000000E91000-memory.dmp
            Filesize

            68KB

          • memory/4084-128-0x0000000001170000-0x0000000001490000-memory.dmp
            Filesize

            3.1MB

          • memory/4084-126-0x000000000041D4F0-mapping.dmp
          • memory/4084-125-0x0000000000400000-0x0000000000429000-memory.dmp
            Filesize

            164KB