Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    22-11-2021 21:41

General

  • Target

    PO NOVEMBER 2021 22 PDF.exe

  • Size

    1012KB

  • MD5

    96423701a8a3e23e41a7e6d6542f2dc6

  • SHA1

    6116c35ff15742f9373ec512e474331e2b1eeffe

  • SHA256

    015174d2840ba0ff84b09efa54379b87fdb761a306d55ec707353f162b8ba39a

  • SHA512

    cc0e48830c2c0d503ac37e8b6000eb4c8060c25a86abe72e1122b5bd2645f7855be267ec5ffcc28166389200228275a0d4ca13d38a1f1d08a95740a8c1987509

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

re6p

C2

http://www.workwithmarym.com/re6p/

Decoy

jedidpress.com

firstimpression.global

iflycny.com

greenandskin.com

tt9577.com

sumidocpa.com

readsprouts.com

heavenlyhighcreations.com

jlhvz.com

ita-web.com

graeds.com

soundtolight.xyz

rajtantra.net

wearinganawesomewoman.store

hrappur.net

wangmiaojf.xyz

youtogo.xyz

mydeadzone.com

qenagypsum.com

kopijhony.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3160
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:1832
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\SysWOW64\wscript.exe"
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:64
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\PO NOVEMBER 2021 22 PDF.exe"
          3⤵
            PID:1620

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/64-133-0x0000000000000000-mapping.dmp
      • memory/64-138-0x0000000004520000-0x00000000045B0000-memory.dmp
        Filesize

        576KB

      • memory/64-136-0x0000000004650000-0x0000000004970000-memory.dmp
        Filesize

        3.1MB

      • memory/64-134-0x00000000002C0000-0x00000000002E7000-memory.dmp
        Filesize

        156KB

      • memory/64-135-0x0000000000280000-0x00000000002A9000-memory.dmp
        Filesize

        164KB

      • memory/1620-137-0x0000000000000000-mapping.dmp
      • memory/2504-126-0x0000000009600000-0x0000000009601000-memory.dmp
        Filesize

        4KB

      • memory/2504-119-0x0000000005480000-0x0000000005481000-memory.dmp
        Filesize

        4KB

      • memory/2504-124-0x0000000002E00000-0x0000000002E9C000-memory.dmp
        Filesize

        624KB

      • memory/2504-125-0x0000000007040000-0x000000000704B000-memory.dmp
        Filesize

        44KB

      • memory/2504-115-0x0000000000980000-0x0000000000981000-memory.dmp
        Filesize

        4KB

      • memory/2504-123-0x00000000065E0000-0x00000000065E1000-memory.dmp
        Filesize

        4KB

      • memory/2504-117-0x0000000005340000-0x0000000005341000-memory.dmp
        Filesize

        4KB

      • memory/2504-118-0x0000000005980000-0x0000000005981000-memory.dmp
        Filesize

        4KB

      • memory/2504-122-0x0000000006620000-0x0000000006621000-memory.dmp
        Filesize

        4KB

      • memory/2504-121-0x0000000005950000-0x0000000005971000-memory.dmp
        Filesize

        132KB

      • memory/2504-120-0x0000000002E00000-0x0000000002E9C000-memory.dmp
        Filesize

        624KB

      • memory/3056-139-0x00000000028C0000-0x0000000002989000-memory.dmp
        Filesize

        804KB

      • memory/3056-132-0x0000000006140000-0x00000000062CF000-memory.dmp
        Filesize

        1.6MB

      • memory/3160-127-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/3160-130-0x0000000001730000-0x0000000001A50000-memory.dmp
        Filesize

        3.1MB

      • memory/3160-131-0x0000000001680000-0x0000000001691000-memory.dmp
        Filesize

        68KB

      • memory/3160-128-0x000000000041D480-mapping.dmp