Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    27-01-2022 15:06

General

  • Target

    Revised Quotation & COA_jpg.exe

  • Size

    551KB

  • MD5

    fce9b050476d555a64ce0522191d1f4a

  • SHA1

    4c34b842888ba0c8f80fdba42055281c18e995f3

  • SHA256

    07569721866b0b2b3d83ec0db9d400f9cd623c51ea30706aaef9e032ec64795e

  • SHA512

    c6ffe706492a009e214e6b6c256bf41406e217a93c9aa9e898b71ea66428c545bb4420f314d7781e9321e9095d678c6440fe4bb12bd8c629a9819e9effc32247

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

quc5

Decoy

writerpilotpublishing.com

journeywands.com

madacambo.com

boreslirealestate.com

drillshear.com

urbanmastic.com

focalbunk.com

ghpgroupinc.xyz

rfgmhnvf.com

241mk.com

mandolinzen.com

thenorthstarbets.com

oggperformancehorses.com

webuywholesalerhouses.com

cinreyyy.com

theyoungwedding.com

neuro-ai-web-ru.digital

zavienniky.xyz

kin-school.com

lowratepersonalloans.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\Revised Quotation & COA_jpg.exe
      "C:\Users\Admin\AppData\Local\Temp\Revised Quotation & COA_jpg.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2504
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:900
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1028
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
          PID:2924

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scripting

    1
    T1064

    Command-Line Interface

    1
    T1059

    Defense Evasion

    Scripting

    1
    T1064

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/900-123-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/900-128-0x0000000005360000-0x00000000054FC000-memory.dmp
      Filesize

      1.6MB

    • memory/900-127-0x0000000005500000-0x0000000005820000-memory.dmp
      Filesize

      3.1MB

    • memory/1028-130-0x0000000000040000-0x000000000004B000-memory.dmp
      Filesize

      44KB

    • memory/1028-131-0x0000000002450000-0x0000000002479000-memory.dmp
      Filesize

      164KB

    • memory/1028-133-0x0000000002900000-0x0000000002A95000-memory.dmp
      Filesize

      1.6MB

    • memory/1028-132-0x0000000002AA0000-0x0000000002DC0000-memory.dmp
      Filesize

      3.1MB

    • memory/2504-122-0x0000000007EF0000-0x0000000007F52000-memory.dmp
      Filesize

      392KB

    • memory/2504-118-0x0000000005650000-0x000000000565A000-memory.dmp
      Filesize

      40KB

    • memory/2504-117-0x0000000005660000-0x00000000056F2000-memory.dmp
      Filesize

      584KB

    • memory/2504-116-0x0000000005C20000-0x000000000611E000-memory.dmp
      Filesize

      5.0MB

    • memory/2504-115-0x0000000000D90000-0x0000000000E20000-memory.dmp
      Filesize

      576KB

    • memory/2504-119-0x0000000005720000-0x0000000005C1E000-memory.dmp
      Filesize

      5.0MB

    • memory/2504-121-0x0000000007D40000-0x0000000007DDC000-memory.dmp
      Filesize

      624KB

    • memory/2504-120-0x0000000005B80000-0x0000000005B8C000-memory.dmp
      Filesize

      48KB

    • memory/3036-129-0x0000000002370000-0x0000000002429000-memory.dmp
      Filesize

      740KB

    • memory/3036-134-0x0000000004DA0000-0x0000000004EC3000-memory.dmp
      Filesize

      1.1MB