Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    05-11-2021 13:36

General

  • Target

    payment.exe

  • Size

    301KB

  • MD5

    c662f5f92a309035df41c2fa8ceec901

  • SHA1

    2555dbb5bf478e472d834d7fee163fa75598eabf

  • SHA256

    43205d5f8958ebc397086aa525220e381f4b0da942f071f236bdbe21280fe1b8

  • SHA512

    8984f03fc2e0849c7e7ade5112158a6375d1b148beeddf35569410f56b1efa92796cac9ec6e94f0e71198fadf6b44cf3e3785eeb75cbd5483d1138d6ed9bc7ff

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

unzn

C2

http://www.davanamays.com/unzn/

Decoy

xiulf.com

highcountrymortar.com

523561.com

marketingagency.tools

ganmovie.net

nationaalcontactpunt.com

sirrbter.com

begizas.xyz

missimi-fashion.com

munixc.info

daas.support

spaceworbc.com

faithtruthresolve.com

gymkub.com

thegrayverse.xyz

artisanmakefurniture.com

029tryy.com

ijuubx.biz

iphone13promax.club

techuniversus.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\payment.exe
      "C:\Users\Admin\AppData\Local\Temp\payment.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2624
      • C:\Users\Admin\AppData\Local\Temp\payment.exe
        "C:\Users\Admin\AppData\Local\Temp\payment.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3780
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2572
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\payment.exe"
        3⤵
          PID:3872

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsuC1DB.tmp\lekf.dll
      MD5

      7308a90795bd1362707bd1299fcaa16b

      SHA1

      0a3af093fb809a129f75381f3128e01e6aa83b8a

      SHA256

      a59f16bf130b8cc3819227b64846d0a909ecd24355143754d9be47576157bf39

      SHA512

      7937636604fbc34b9d1dbfdbb3bf93cb62318506e67cdff5d4deeb2149046e7f494c69e4dd319ed769009bc1872d67a2380ed7b259bf9276898b4a0862d4c2c4

    • memory/2572-128-0x0000000001230000-0x0000000001242000-memory.dmp
      Filesize

      72KB

    • memory/2572-130-0x0000000000E80000-0x0000000000EA9000-memory.dmp
      Filesize

      164KB

    • memory/2572-132-0x0000000000F10000-0x000000000105A000-memory.dmp
      Filesize

      1.3MB

    • memory/2572-129-0x0000000004650000-0x0000000004970000-memory.dmp
      Filesize

      3.1MB

    • memory/2572-127-0x00000000000F0000-0x00000000000F1000-memory.dmp
      Filesize

      4KB

    • memory/2572-125-0x0000000000000000-mapping.dmp
    • memory/2572-126-0x00000000000F0000-0x00000000000F1000-memory.dmp
      Filesize

      4KB

    • memory/3056-124-0x0000000004DE0000-0x0000000004F55000-memory.dmp
      Filesize

      1.5MB

    • memory/3056-133-0x00000000025B0000-0x0000000002664000-memory.dmp
      Filesize

      720KB

    • memory/3780-119-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/3780-123-0x0000000000EA0000-0x0000000000EB1000-memory.dmp
      Filesize

      68KB

    • memory/3780-120-0x000000000041D430-mapping.dmp
    • memory/3780-121-0x00000000009E0000-0x0000000000D00000-memory.dmp
      Filesize

      3.1MB

    • memory/3872-131-0x0000000000000000-mapping.dmp