Analysis

  • max time kernel
    153s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    25-01-2022 08:04

General

  • Target

    SNO22 595406_RACX-159814.exe

  • Size

    819KB

  • MD5

    b5c5e59e2ced576d7897a76f8e2bcca5

  • SHA1

    2d9bf0b46cd37f89be12d12c36ed833894e8e749

  • SHA256

    d80d56cfde862aefb9ea4a4195b12cafc5e93f60bb13d2e1a8a1a5b6fe49d9c5

  • SHA512

    124b9c1a53eff953fa0c5d9b8b2704523a3e26f7fab1c6a677df36ec9ba02d5e352d3f4d249b3e8a56309875b37bc6c8d114be4aec0ba4abd9260144f749cacd

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p8ce

Decoy

wishmeluck1.xyz

nawabumi.com

terra.fish

eoraipsumami.quest

awakeningyourid.com

csyein.com

tslsinteligentes.com

cataractusa.com

capitalwheelstogo.com

staffremotely.com

trashbinwasher.com

blaneyparkrendezvous.com

yolrt.com

northendtaproom.com

showgeini.com

b95206.com

almcpersonaltraining.com

lovabledoodleshome.com

woodlandstationcondos.com

nikahlive.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
      "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2416
      • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
        "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3940
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3644
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
          PID:812

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2416-123-0x0000000006470000-0x0000000006514000-memory.dmp
      Filesize

      656KB

    • memory/2416-117-0x00000000054C0000-0x0000000005552000-memory.dmp
      Filesize

      584KB

    • memory/2416-115-0x0000000000BB0000-0x0000000000C84000-memory.dmp
      Filesize

      848KB

    • memory/2416-118-0x00000000055B0000-0x0000000005AAE000-memory.dmp
      Filesize

      5.0MB

    • memory/2416-119-0x00000000054B0000-0x00000000054BA000-memory.dmp
      Filesize

      40KB

    • memory/2416-120-0x00000000057C0000-0x000000000585C000-memory.dmp
      Filesize

      624KB

    • memory/2416-121-0x000000007EFC0000-0x000000007EFC1000-memory.dmp
      Filesize

      4KB

    • memory/2416-122-0x0000000005920000-0x000000000592E000-memory.dmp
      Filesize

      56KB

    • memory/2416-116-0x0000000005AB0000-0x0000000005FAE000-memory.dmp
      Filesize

      5.0MB

    • memory/3028-128-0x0000000004E10000-0x0000000004F4E000-memory.dmp
      Filesize

      1.2MB

    • memory/3028-133-0x0000000004F50000-0x00000000050AD000-memory.dmp
      Filesize

      1.4MB

    • memory/3644-132-0x0000000004FA0000-0x0000000005131000-memory.dmp
      Filesize

      1.6MB

    • memory/3644-129-0x00000000009E0000-0x00000000009EA000-memory.dmp
      Filesize

      40KB

    • memory/3644-130-0x0000000000740000-0x0000000000769000-memory.dmp
      Filesize

      164KB

    • memory/3644-131-0x00000000052E0000-0x0000000005600000-memory.dmp
      Filesize

      3.1MB

    • memory/3940-125-0x00000000019F0000-0x0000000001D10000-memory.dmp
      Filesize

      3.1MB

    • memory/3940-127-0x0000000001850000-0x00000000019E1000-memory.dmp
      Filesize

      1.6MB

    • memory/3940-124-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB