Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    24-01-2022 10:56

General

  • Target

    IMG-78293792.exe

  • Size

    356KB

  • MD5

    cb94f8bf4453d77ed35b4cccad18260c

  • SHA1

    aeacb009addb2152c05a34537f565e66b32b25d2

  • SHA256

    a39d6226eed5913f2f1d77991f011a386453d095689f85eb0ca14aac1d983466

  • SHA512

    7fb17a554481d5ff6c28edd4ee43b9306a8e59ac9f992a2b6d243b2d88eb9daa997bbf5be962f331c6ec282b15e4e67107c233691a6b05d317957072754f4135

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

c6si

Decoy

tristateinc.construction

americanscaregroundstexas.com

kanimisoshiru.com

wihling.com

fishcheekstosa.com

parentsfuid.com

greenstandmarket.com

fc8fla8kzq.com

gametwist-83.club

jobsncvs.com

directrealtysells.com

avida2015.com

conceptasite.net

arkaneattire.com

indev-mobility.info

2160centurypark412.com

valefloor.com

septembership.com

stackflix.com

jimc0sales.net

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\IMG-78293792.exe
      "C:\Users\Admin\AppData\Local\Temp\IMG-78293792.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2352
      • C:\Users\Admin\AppData\Local\Temp\IMG-78293792.exe
        "C:\Users\Admin\AppData\Local\Temp\IMG-78293792.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3292
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:504
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:3272
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:1620
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:3644
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:3276
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:3320
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:812
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:4000
                    • C:\Windows\SysWOW64\autochk.exe
                      "C:\Windows\SysWOW64\autochk.exe"
                      2⤵
                        PID:636
                      • C:\Windows\SysWOW64\wscript.exe
                        "C:\Windows\SysWOW64\wscript.exe"
                        2⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2828
                        • C:\Windows\SysWOW64\cmd.exe
                          /c del "C:\Users\Admin\AppData\Local\Temp\IMG-78293792.exe"
                          3⤵
                            PID:1328

                      Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/2352-123-0x0000000008890000-0x00000000088EE000-memory.dmp
                        Filesize

                        376KB

                      • memory/2352-117-0x0000000004DB0000-0x0000000004E42000-memory.dmp
                        Filesize

                        584KB

                      • memory/2352-115-0x00000000003E0000-0x0000000000440000-memory.dmp
                        Filesize

                        384KB

                      • memory/2352-118-0x0000000004E50000-0x0000000004E5A000-memory.dmp
                        Filesize

                        40KB

                      • memory/2352-119-0x0000000004D10000-0x0000000004DA2000-memory.dmp
                        Filesize

                        584KB

                      • memory/2352-120-0x0000000005160000-0x0000000005170000-memory.dmp
                        Filesize

                        64KB

                      • memory/2352-121-0x0000000008480000-0x00000000084CB000-memory.dmp
                        Filesize

                        300KB

                      • memory/2352-122-0x00000000087F0000-0x000000000888C000-memory.dmp
                        Filesize

                        624KB

                      • memory/2352-116-0x00000000053D0000-0x00000000058CE000-memory.dmp
                        Filesize

                        5.0MB

                      • memory/2828-130-0x0000000002CC0000-0x0000000002CE9000-memory.dmp
                        Filesize

                        164KB

                      • memory/2828-129-0x0000000000C90000-0x0000000000CB7000-memory.dmp
                        Filesize

                        156KB

                      • memory/2828-131-0x0000000005010000-0x0000000005330000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/2828-132-0x0000000004CD0000-0x0000000004E69000-memory.dmp
                        Filesize

                        1.6MB

                      • memory/3028-133-0x0000000002620000-0x0000000002706000-memory.dmp
                        Filesize

                        920KB

                      • memory/3028-128-0x0000000005EF0000-0x0000000006060000-memory.dmp
                        Filesize

                        1.4MB

                      • memory/3292-125-0x0000000001920000-0x0000000001C40000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/3292-127-0x00000000013C0000-0x000000000150A000-memory.dmp
                        Filesize

                        1.3MB

                      • memory/3292-124-0x0000000000400000-0x0000000000429000-memory.dmp
                        Filesize

                        164KB