Analysis

  • max time kernel
    151s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    27-01-2022 09:51

General

  • Target

    S.O.A. For JAN22_pdf.exe

  • Size

    385KB

  • MD5

    7ec785f4a7f89ef669f4ae8f27944acd

  • SHA1

    82a7ffc5b412cb1728afca2c22df3f8e24146df7

  • SHA256

    bf5b18ccd94ad7519a945dc977e60d505e488edb1a7b91bc13a8031fe5cea262

  • SHA512

    e90d2e4dd59c57c6cab86e6d27d094f220fc5fafc8c1efae14ceaa349083ff42334ae845e55682c62c00ca03b7cc22fad267753303942b7b83a740de8f040b2f

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b23k

Decoy

foxsistersofhydesville.com

jetronbang.com

agriturismopartingoli.com

ihiinscus.com

zaksrestaurants.store

aspetac.com

ycjhjd.com

fountainspringscapemay.com

earlydose.com

nocodebelgium.com

65235.xyz

yasesite.com

steeltoilets.com

xceqa.xyz

2021udtv.com

belorusneft.top

the4asofdekhockey.com

gertexhosiery.com

fidelismortgages.com

bellacomoninguna.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1312
      • C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe"
        3⤵
        • Deletes itself
        PID:1896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/784-66-0x0000000000090000-0x00000000000A6000-memory.dmp
    Filesize

    88KB

  • memory/784-69-0x0000000001CE0000-0x0000000001D70000-memory.dmp
    Filesize

    576KB

  • memory/784-68-0x0000000001F70000-0x0000000002273000-memory.dmp
    Filesize

    3.0MB

  • memory/784-67-0x00000000000B0000-0x00000000000D9000-memory.dmp
    Filesize

    164KB

  • memory/1228-63-0x0000000000800000-0x0000000000B03000-memory.dmp
    Filesize

    3.0MB

  • memory/1228-59-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1228-60-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1228-61-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1228-64-0x0000000000280000-0x0000000000291000-memory.dmp
    Filesize

    68KB

  • memory/1312-54-0x0000000000F90000-0x0000000000FF6000-memory.dmp
    Filesize

    408KB

  • memory/1312-58-0x00000000051E0000-0x0000000005242000-memory.dmp
    Filesize

    392KB

  • memory/1312-57-0x0000000000950000-0x000000000095C000-memory.dmp
    Filesize

    48KB

  • memory/1312-56-0x0000000004950000-0x0000000004951000-memory.dmp
    Filesize

    4KB

  • memory/1312-55-0x0000000076911000-0x0000000076913000-memory.dmp
    Filesize

    8KB

  • memory/1316-65-0x0000000005F10000-0x000000000602F000-memory.dmp
    Filesize

    1.1MB

  • memory/1316-70-0x0000000006320000-0x0000000006446000-memory.dmp
    Filesize

    1.1MB