Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 09:51

General

  • Target

    S.O.A. For JAN22_pdf.exe

  • Size

    385KB

  • MD5

    7ec785f4a7f89ef669f4ae8f27944acd

  • SHA1

    82a7ffc5b412cb1728afca2c22df3f8e24146df7

  • SHA256

    bf5b18ccd94ad7519a945dc977e60d505e488edb1a7b91bc13a8031fe5cea262

  • SHA512

    e90d2e4dd59c57c6cab86e6d27d094f220fc5fafc8c1efae14ceaa349083ff42334ae845e55682c62c00ca03b7cc22fad267753303942b7b83a740de8f040b2f

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

b23k

Decoy

foxsistersofhydesville.com

jetronbang.com

agriturismopartingoli.com

ihiinscus.com

zaksrestaurants.store

aspetac.com

ycjhjd.com

fountainspringscapemay.com

earlydose.com

nocodebelgium.com

65235.xyz

yasesite.com

steeltoilets.com

xceqa.xyz

2021udtv.com

belorusneft.top

the4asofdekhockey.com

gertexhosiery.com

fidelismortgages.com

bellacomoninguna.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2968
    • C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2224
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:604
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\S.O.A. For JAN22_pdf.exe"
        3⤵
          PID:1372

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/604-134-0x0000000004410000-0x000000000459D000-memory.dmp
      Filesize

      1.6MB

    • memory/604-132-0x00000000005A0000-0x00000000005C9000-memory.dmp
      Filesize

      164KB

    • memory/604-133-0x0000000004740000-0x0000000004A60000-memory.dmp
      Filesize

      3.1MB

    • memory/604-131-0x0000000000B30000-0x0000000000B43000-memory.dmp
      Filesize

      76KB

    • memory/2224-125-0x0000000001500000-0x0000000001820000-memory.dmp
      Filesize

      3.1MB

    • memory/2224-129-0x0000000001A40000-0x0000000001A51000-memory.dmp
      Filesize

      68KB

    • memory/2224-128-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2224-126-0x0000000001360000-0x00000000014F2000-memory.dmp
      Filesize

      1.6MB

    • memory/2224-123-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2504-120-0x0000000005A90000-0x0000000005A9C000-memory.dmp
      Filesize

      48KB

    • memory/2504-122-0x00000000080F0000-0x0000000008152000-memory.dmp
      Filesize

      392KB

    • memory/2504-121-0x0000000007F70000-0x000000000800C000-memory.dmp
      Filesize

      624KB

    • memory/2504-115-0x0000000000FA0000-0x0000000001006000-memory.dmp
      Filesize

      408KB

    • memory/2504-119-0x00000000059B0000-0x00000000059BA000-memory.dmp
      Filesize

      40KB

    • memory/2504-118-0x00000000033C0000-0x00000000033C1000-memory.dmp
      Filesize

      4KB

    • memory/2504-117-0x0000000005910000-0x00000000059A2000-memory.dmp
      Filesize

      584KB

    • memory/2504-116-0x0000000005E10000-0x000000000630E000-memory.dmp
      Filesize

      5.0MB

    • memory/2968-127-0x0000000006DB0000-0x0000000006ECD000-memory.dmp
      Filesize

      1.1MB

    • memory/2968-130-0x0000000001450000-0x0000000001554000-memory.dmp
      Filesize

      1.0MB

    • memory/2968-135-0x0000000005820000-0x000000000592E000-memory.dmp
      Filesize

      1.1MB