Analysis

  • max time kernel
    123s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    03-11-2021 19:39

General

  • Target

    36ca5751b0b2d9321215f223a18aefbf.exe

  • Size

    324KB

  • MD5

    36ca5751b0b2d9321215f223a18aefbf

  • SHA1

    c9661ff48f2eaa2718a46b23a70a02a8461715be

  • SHA256

    602c4326ca0aa0a007b10241d7dae3fdbef7705e14231ba85e8635578cfdb0d4

  • SHA512

    f698c83167eda1832e90eeed65d39883b6515c0f6c718e3ce6d517e6d230bab14b15a920f90979a2cf55c601688819deec0de2b47278a032103a22fd2fe2774c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ga6b

C2

http://www.egyptian-museum.com/ga6b/

Decoy

diasporacospices.com

sd-shenghe.com

onlinewritingjobs.net

greenstreamgroup.store

garageair.agency

idh-bf.com

middenhavendambreskens.com

szkoleniawcag.online

wiremefeelings.com

ottosperformance.com

brothermush.com

weiserpath.com

baohiemtv24h.com

glassgalaxynft.com

spiritualmind.space

18130072012.com

3v0.space

smartgadgetscompare.com

corvusexpeditii.xyz

egcontabilidade.website

Signatures

  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 53 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\36ca5751b0b2d9321215f223a18aefbf.exe
    "C:\Users\Admin\AppData\Local\Temp\36ca5751b0b2d9321215f223a18aefbf.exe"
    1⤵
    • Modifies system executable filetype association
    • Drops file in Program Files directory
    • Drops file in Windows directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe
      "C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4052
      • C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        PID:4008

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe
    MD5

    2cdc3d96a11abe92e9869d888d6c1696

    SHA1

    910cb0036b3e9a2834208a2361ca28912ade8f6c

    SHA256

    34957e2abc46b8e90fa220eedbdaedd08b021f54bfbc1155069b1165858b67dd

    SHA512

    dee221ce6e7d3ecc76af588897780b2c7124058e3bc8edb8c50112bde90ef28a7d3dc9557a0d6ccbc85396c748608497a6601fbbf256bd4cb2ba087cc283654b

  • C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe
    MD5

    2cdc3d96a11abe92e9869d888d6c1696

    SHA1

    910cb0036b3e9a2834208a2361ca28912ade8f6c

    SHA256

    34957e2abc46b8e90fa220eedbdaedd08b021f54bfbc1155069b1165858b67dd

    SHA512

    dee221ce6e7d3ecc76af588897780b2c7124058e3bc8edb8c50112bde90ef28a7d3dc9557a0d6ccbc85396c748608497a6601fbbf256bd4cb2ba087cc283654b

  • C:\Users\Admin\AppData\Local\Temp\3582-490\36ca5751b0b2d9321215f223a18aefbf.exe
    MD5

    2cdc3d96a11abe92e9869d888d6c1696

    SHA1

    910cb0036b3e9a2834208a2361ca28912ade8f6c

    SHA256

    34957e2abc46b8e90fa220eedbdaedd08b021f54bfbc1155069b1165858b67dd

    SHA512

    dee221ce6e7d3ecc76af588897780b2c7124058e3bc8edb8c50112bde90ef28a7d3dc9557a0d6ccbc85396c748608497a6601fbbf256bd4cb2ba087cc283654b

  • \Users\Admin\AppData\Local\Temp\nsbE12A.tmp\tdledysx.dll
    MD5

    ab2962aabbe70e27d355dacf203405e6

    SHA1

    729bb1a7412903e2574ccc129409b70cbd55e01a

    SHA256

    dc3786cc8cbf1abd5261926553b407c82c97eefa6d4cafdb3c7147295a65e450

    SHA512

    3e8c94d585a02f108fd2fd0bfef3a252e196280e03a2e17e3b5d978a6d9ae5652cdfc5bc9ddd5df2f986a1d1e3fe959391be75a49e84d51771dea3d0854f3d40

  • memory/4008-122-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/4008-123-0x000000000041D4E0-mapping.dmp
  • memory/4008-125-0x00000000009C0000-0x0000000000CE0000-memory.dmp
    Filesize

    3.1MB

  • memory/4052-118-0x0000000000000000-mapping.dmp