Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    22-01-2022 00:06

General

  • Target

    SKM-97116373-PDF.exe

  • Size

    322KB

  • MD5

    49fd93fb9699d57c47b6c1ae98282170

  • SHA1

    2ceb5be3f5cc5f91862d866c2b6b695b144cfa56

  • SHA256

    d6fce7f4f6a8c7c7ec013bd177f42ab0a9ef8d8ce6f505245ea09e41d33201e0

  • SHA512

    a2c41afc8a7fa52f309efeba8e31966ea376e6ef18870f59adf4531469c07cf2d55ed5ce46c0ea988da6d0e7cbb401cd8dbcf956ae27b21ad22259d1cdc8950f

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1436
    • C:\Users\Admin\AppData\Local\Temp\SKM-97116373-PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\SKM-97116373-PDF.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1916
      • C:\Users\Admin\AppData\Local\Temp\SKM-97116373-PDF.exe
        "C:\Users\Admin\AppData\Local\Temp\SKM-97116373-PDF.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:544
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:584
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\SKM-97116373-PDF.exe"
        3⤵
        • Deletes itself
        PID:112

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsiC4A8.tmp\rwam.dll
    MD5

    33a74a4b53cd8dff8593605ea8308f77

    SHA1

    8cca33ee4e2079d196f4b4be2a42a537c3f00b13

    SHA256

    091beda14bcaac53625f006d1f77f6c8bfc07aa45174762057ae4d698a854e1b

    SHA512

    8843daad9fc93451eba9371b8dce2c975b81f7a94aa5cd402854a633092fac3815c585fa2dc1a26a76b9ed7709ea176f70b19392a5ca1144743e182aacdbfaad

  • memory/544-61-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/544-56-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/544-58-0x0000000000840000-0x0000000000B43000-memory.dmp
    Filesize

    3.0MB

  • memory/544-59-0x00000000002C0000-0x00000000002D1000-memory.dmp
    Filesize

    68KB

  • memory/544-62-0x0000000000310000-0x0000000000321000-memory.dmp
    Filesize

    68KB

  • memory/584-64-0x00000000004C0000-0x00000000004D6000-memory.dmp
    Filesize

    88KB

  • memory/584-65-0x00000000000C0000-0x00000000000E9000-memory.dmp
    Filesize

    164KB

  • memory/584-66-0x0000000002000000-0x0000000002303000-memory.dmp
    Filesize

    3.0MB

  • memory/584-67-0x0000000000570000-0x0000000000600000-memory.dmp
    Filesize

    576KB

  • memory/1436-60-0x0000000005EB0000-0x0000000005F6B000-memory.dmp
    Filesize

    748KB

  • memory/1436-63-0x0000000005F80000-0x0000000006039000-memory.dmp
    Filesize

    740KB

  • memory/1436-68-0x00000000066C0000-0x0000000006757000-memory.dmp
    Filesize

    604KB

  • memory/1916-54-0x0000000075F21000-0x0000000075F23000-memory.dmp
    Filesize

    8KB