Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    25-01-2022 12:50

General

  • Target

    SNO22 595406_RACX-159814.exe

  • Size

    819KB

  • MD5

    b5c5e59e2ced576d7897a76f8e2bcca5

  • SHA1

    2d9bf0b46cd37f89be12d12c36ed833894e8e749

  • SHA256

    d80d56cfde862aefb9ea4a4195b12cafc5e93f60bb13d2e1a8a1a5b6fe49d9c5

  • SHA512

    124b9c1a53eff953fa0c5d9b8b2704523a3e26f7fab1c6a677df36ec9ba02d5e352d3f4d249b3e8a56309875b37bc6c8d114be4aec0ba4abd9260144f749cacd

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p8ce

Decoy

wishmeluck1.xyz

nawabumi.com

terra.fish

eoraipsumami.quest

awakeningyourid.com

csyein.com

tslsinteligentes.com

cataractusa.com

capitalwheelstogo.com

staffremotely.com

trashbinwasher.com

blaneyparkrendezvous.com

yolrt.com

northendtaproom.com

showgeini.com

b95206.com

almcpersonaltraining.com

lovabledoodleshome.com

woodlandstationcondos.com

nikahlive.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1292
    • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
      "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1220
      • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
        "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
          PID:112
        • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
          "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:564
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1676
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
          3⤵
          • Deletes itself
          PID:1704

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/564-59-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/564-64-0x0000000000220000-0x0000000000231000-memory.dmp
      Filesize

      68KB

    • memory/564-63-0x0000000000860000-0x0000000000B63000-memory.dmp
      Filesize

      3.0MB

    • memory/564-61-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/564-60-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1220-57-0x000000007EF40000-0x000000007EF41000-memory.dmp
      Filesize

      4KB

    • memory/1220-58-0x0000000005390000-0x0000000005434000-memory.dmp
      Filesize

      656KB

    • memory/1220-53-0x0000000000F30000-0x0000000001004000-memory.dmp
      Filesize

      848KB

    • memory/1220-56-0x0000000000950000-0x000000000095E000-memory.dmp
      Filesize

      56KB

    • memory/1220-55-0x0000000002410000-0x00000000044A0000-memory.dmp
      Filesize

      32.6MB

    • memory/1220-54-0x0000000076071000-0x0000000076073000-memory.dmp
      Filesize

      8KB

    • memory/1292-65-0x00000000048E0000-0x00000000049B7000-memory.dmp
      Filesize

      860KB

    • memory/1292-70-0x0000000006610000-0x00000000066F6000-memory.dmp
      Filesize

      920KB

    • memory/1676-66-0x000000004AB00000-0x000000004AB4C000-memory.dmp
      Filesize

      304KB

    • memory/1676-67-0x00000000001D0000-0x00000000001F9000-memory.dmp
      Filesize

      164KB

    • memory/1676-68-0x0000000002080000-0x0000000002383000-memory.dmp
      Filesize

      3.0MB

    • memory/1676-69-0x0000000001DB0000-0x0000000001E40000-memory.dmp
      Filesize

      576KB