Resubmissions

25-01-2022 14:51

220125-r8j1taheg5 10

25-01-2022 14:19

220125-rmt9naghgj 10

Analysis

  • max time kernel
    160s
  • max time network
    169s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    25-01-2022 14:19

General

  • Target

    SNO22 595406_RACX-159814.exe

  • Size

    740KB

  • MD5

    57d59a3b3d87c9e5808da7ad2b013955

  • SHA1

    22a3f4dceee7b5f63e9e940a435412362f947878

  • SHA256

    58fb47124bf49f4190852baec863af03f73216cbba65c7eaa527f6ec6612e42b

  • SHA512

    63b009c902adb07e83d9e28917e1f3ee5a4a49ae426ca4b99a29eeaa961c56e1456fceb02f078578f37a271e98276249ba182686bfdca60053cc8bef08802125

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p8ce

Decoy

wishmeluck1.xyz

nawabumi.com

terra.fish

eoraipsumami.quest

awakeningyourid.com

csyein.com

tslsinteligentes.com

cataractusa.com

capitalwheelstogo.com

staffremotely.com

trashbinwasher.com

blaneyparkrendezvous.com

yolrt.com

northendtaproom.com

showgeini.com

b95206.com

almcpersonaltraining.com

lovabledoodleshome.com

woodlandstationcondos.com

nikahlive.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:396
    • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
      "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3372
      • C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe
        "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1272
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\SNO22 595406_RACX-159814.exe"
        3⤵
          PID:1860

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/396-137-0x0000000002800000-0x00000000028F8000-memory.dmp
      Filesize

      992KB

    • memory/396-132-0x0000000000AB0000-0x0000000000B86000-memory.dmp
      Filesize

      856KB

    • memory/1272-128-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1272-131-0x0000000000D80000-0x0000000000F11000-memory.dmp
      Filesize

      1.6MB

    • memory/1272-129-0x0000000000F20000-0x0000000001240000-memory.dmp
      Filesize

      3.1MB

    • memory/2828-136-0x0000000000E90000-0x000000000101D000-memory.dmp
      Filesize

      1.6MB

    • memory/2828-134-0x0000000000710000-0x0000000000739000-memory.dmp
      Filesize

      164KB

    • memory/2828-135-0x0000000003490000-0x00000000037B0000-memory.dmp
      Filesize

      3.1MB

    • memory/2828-133-0x0000000001030000-0x000000000103C000-memory.dmp
      Filesize

      48KB

    • memory/3372-122-0x0000000005A00000-0x0000000005EFE000-memory.dmp
      Filesize

      5.0MB

    • memory/3372-127-0x0000000008350000-0x00000000083AE000-memory.dmp
      Filesize

      376KB

    • memory/3372-126-0x000000007F5F0000-0x000000007F5F1000-memory.dmp
      Filesize

      4KB

    • memory/3372-125-0x0000000007F00000-0x0000000007F4B000-memory.dmp
      Filesize

      300KB

    • memory/3372-124-0x0000000007EF0000-0x0000000007EFC000-memory.dmp
      Filesize

      48KB

    • memory/3372-123-0x0000000007E40000-0x0000000007EDC000-memory.dmp
      Filesize

      624KB

    • memory/3372-118-0x0000000000DE0000-0x0000000000EA0000-memory.dmp
      Filesize

      768KB

    • memory/3372-121-0x00000000032C0000-0x00000000032CA000-memory.dmp
      Filesize

      40KB

    • memory/3372-120-0x00000000058C0000-0x0000000005952000-memory.dmp
      Filesize

      584KB

    • memory/3372-119-0x0000000005F00000-0x00000000063FE000-memory.dmp
      Filesize

      5.0MB