Resubmissions

25-01-2022 14:51

220125-r8j1taheg5 10

25-01-2022 14:19

220125-rmt9naghgj 10

Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    25-01-2022 14:19

General

  • Target

    SNO22 595406_RACX-159814.exe

  • Size

    740KB

  • MD5

    57d59a3b3d87c9e5808da7ad2b013955

  • SHA1

    22a3f4dceee7b5f63e9e940a435412362f947878

  • SHA256

    58fb47124bf49f4190852baec863af03f73216cbba65c7eaa527f6ec6612e42b

  • SHA512

    63b009c902adb07e83d9e28917e1f3ee5a4a49ae426ca4b99a29eeaa961c56e1456fceb02f078578f37a271e98276249ba182686bfdca60053cc8bef08802125

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p8ce

Decoy

wishmeluck1.xyz

nawabumi.com

terra.fish

eoraipsumami.quest

awakeningyourid.com

csyein.com

tslsinteligentes.com

cataractusa.com

capitalwheelstogo.com

staffremotely.com

trashbinwasher.com

blaneyparkrendezvous.com

yolrt.com

northendtaproom.com

showgeini.com

b95206.com

almcpersonaltraining.com

lovabledoodleshome.com

woodlandstationcondos.com

nikahlive.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
      "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1592
      • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
        "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1824
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:620
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
        • Deletes itself
        PID:1040

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/620-70-0x0000000000760000-0x00000000007F0000-memory.dmp
    Filesize

    576KB

  • memory/620-69-0x0000000002360000-0x0000000002663000-memory.dmp
    Filesize

    3.0MB

  • memory/620-68-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/620-67-0x00000000003B0000-0x00000000003B9000-memory.dmp
    Filesize

    36KB

  • memory/1208-66-0x00000000062A0000-0x0000000006409000-memory.dmp
    Filesize

    1.4MB

  • memory/1208-71-0x00000000060C0000-0x000000000620C000-memory.dmp
    Filesize

    1.3MB

  • memory/1592-58-0x000000007EF40000-0x000000007EF41000-memory.dmp
    Filesize

    4KB

  • memory/1592-59-0x0000000004FE0000-0x000000000503E000-memory.dmp
    Filesize

    376KB

  • memory/1592-54-0x0000000000BC0000-0x0000000000C80000-memory.dmp
    Filesize

    768KB

  • memory/1592-57-0x0000000000470000-0x000000000047C000-memory.dmp
    Filesize

    48KB

  • memory/1592-56-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
    Filesize

    4KB

  • memory/1592-55-0x0000000076151000-0x0000000076153000-memory.dmp
    Filesize

    8KB

  • memory/1824-61-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1824-62-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1824-64-0x0000000000700000-0x0000000000A03000-memory.dmp
    Filesize

    3.0MB

  • memory/1824-65-0x0000000000430000-0x0000000000441000-memory.dmp
    Filesize

    68KB

  • memory/1824-60-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB