Analysis

  • max time kernel
    112s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    21-01-2022 11:09

General

  • Target

    adbb0a2d948271b626589d5e305bdda36bad62e00b58847d0a7dae3688d5c376.exe

  • Size

    324KB

  • MD5

    b1e0b1657595b806097a1529c2ae0620

  • SHA1

    7cdd036a4769354e8a325c2231456187ee211cef

  • SHA256

    adbb0a2d948271b626589d5e305bdda36bad62e00b58847d0a7dae3688d5c376

  • SHA512

    f7c05ecd44b986eafc3e0ea9a9f1bdb785fee6e3538b25f79d567aebf666758be0a2583123d061a74cf8325d39a3422dd2390d405d5f215a6ebb5852e3a15243

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

u6vb

Decoy

blendedmatter.com

piquinmarketing.com

dubkirelax.online

optimumotoaksesuar.com

bendisle.com

islamicgeometricpatterns.net

cheesebox.online

lh-coaching.com

buildingmaterial.info

backwoods72.com

goodtreetee.com

zknqqpvsypx.mobi

phukienstreaming.com

turkistick.com

cbd-shop-portugal.com

imherllc.com

krallechols.quest

ttmmb.com

pornmodelsworld.com

weakyummy.space

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 1 IoCs
  • Sets service image path in registry 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\adbb0a2d948271b626589d5e305bdda36bad62e00b58847d0a7dae3688d5c376.exe
    "C:\Users\Admin\AppData\Local\Temp\adbb0a2d948271b626589d5e305bdda36bad62e00b58847d0a7dae3688d5c376.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4064
    • C:\Users\Admin\AppData\Local\Temp\adbb0a2d948271b626589d5e305bdda36bad62e00b58847d0a7dae3688d5c376.exe
      "C:\Users\Admin\AppData\Local\Temp\adbb0a2d948271b626589d5e305bdda36bad62e00b58847d0a7dae3688d5c376.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1812
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe 74e4d7d721e4810dc291e6c5dd95279d /fHnhOTCGk2FIQ1skF4/hw.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:3912

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\nsz1651.tmp\kgdqnmtp.dll
    MD5

    0ded8be0940c363d4b85da0aef7bf396

    SHA1

    3a010b525bea9fa70bfcb2c24ae2a7c1afa24540

    SHA256

    a373282700b60a07e656c8aec000d77996d53e8591819099a812c9633f597af2

    SHA512

    c0184ca441846e67e8c005494a33b37bed6a79d073125d21a70e89cddabdec5994f6430920eaf00125a6675103d999ebe2d1470bf99c969898262665071b2047

  • memory/1812-134-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB