Analysis

  • max time kernel
    156s
  • max time network
    155s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    25-11-2021 15:50

General

  • Target

    Se adjunta el pedido, proforma.exe

  • Size

    714KB

  • MD5

    deea7525a547ed7a9ef6c81b04478f3e

  • SHA1

    b29c935913a55c9bad3979d05d97a6ebda871604

  • SHA256

    413e8df7f149aa643aaa1ef70e953ab2112827b652f1cf05b6420ed6a119962d

  • SHA512

    ddb161a25bdc6465ddba19c8781773006e8cbf7b8e909aae20eb4cc577b085c72d75bed40b0d4ab2363003759a344b1aad2235381ab3c10043b3e47e2ee9f139

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

euv4

C2

http://www.rematedeldia.com/euv4/

Decoy

anniebapartments.com

hagenbicycles.com

herbalist101.com

southerncorrosion.net

kuechenpruefer.com

tajniezdrzi.quest

segurofunerarioar.com

boardsandbeamsdecor.com

alifdanismanlik.com

pkem.top

mddc.clinic

handejqr.com

crux-at.com

awp.email

hugsforbubbs.com

cielotherepy.com

turkcuyuz.com

teamidc.com

lankasirinspa.com

68135.online

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\Se adjunta el pedido, proforma.exe
      "C:\Users\Admin\AppData\Local\Temp\Se adjunta el pedido, proforma.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:348
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\DpiScaling.exe"
        3⤵
          PID:60

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/60-131-0x0000000000000000-mapping.dmp
    • memory/348-127-0x0000000000000000-mapping.dmp
    • memory/348-132-0x00000000029B0000-0x0000000002A40000-memory.dmp
      Filesize

      576KB

    • memory/348-130-0x0000000002CF0000-0x0000000003010000-memory.dmp
      Filesize

      3.1MB

    • memory/348-128-0x0000000000350000-0x0000000000367000-memory.dmp
      Filesize

      92KB

    • memory/348-129-0x0000000000250000-0x0000000000279000-memory.dmp
      Filesize

      164KB

    • memory/1020-123-0x0000000073D80000-0x0000000073DA9000-memory.dmp
      Filesize

      164KB

    • memory/1020-125-0x0000000004B70000-0x0000000004B81000-memory.dmp
      Filesize

      68KB

    • memory/1020-124-0x0000000004D20000-0x0000000005040000-memory.dmp
      Filesize

      3.1MB

    • memory/1020-122-0x0000000002B60000-0x0000000002B61000-memory.dmp
      Filesize

      4KB

    • memory/1020-120-0x0000000000000000-mapping.dmp
    • memory/2768-118-0x0000000002210000-0x0000000002211000-memory.dmp
      Filesize

      4KB

    • memory/2768-119-0x0000000002901000-0x0000000002915000-memory.dmp
      Filesize

      80KB

    • memory/3024-126-0x0000000006490000-0x00000000065D9000-memory.dmp
      Filesize

      1.3MB

    • memory/3024-133-0x0000000002F70000-0x0000000003036000-memory.dmp
      Filesize

      792KB