Analysis

  • max time kernel
    152s
  • max time network
    153s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    28-01-2022 08:35

General

  • Target

    HSBC Bank Swift Copy.pdf.exe

  • Size

    752KB

  • MD5

    76b0f4441930d3f2f480830681c426e7

  • SHA1

    0b28664196cd55adcc7b82647602db984dd49f61

  • SHA256

    3cc59342fdbb5aa332f7d99216ac3f1ede121e0752e5aaff260e16432c23908d

  • SHA512

    63d7cbcaa3b46cce81727e5baa82e5daa055b3ad95d1fb14086bf2dd2bbd2811400b15e9231a18dc5ab1771c18f2047077baaefe8b970463da947fc650d32884

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

rexd

Decoy

xn--2es77o3w1bruk.mobi

cotesaintetienne.com

newlifefoursquaremcpherson.com

solutions-consulting.biz

chsico.com

demeet.xyz

eiruhguijire.store

realestatemoda.com

amr-fire.net

99v.one

altdaita.com

showerbeast.com

nsfone.com

doanhnhanvietnam.info

xn--transfpanou-39a.com

invitiz.com

chifaebio.xyz

footprint-farm.com

onlinenurseprograms.com

tigeratlspa.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Users\Admin\AppData\Local\Temp\HSBC Bank Swift Copy.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\HSBC Bank Swift Copy.pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2552
      • C:\Users\Admin\AppData\Local\Temp\HSBC Bank Swift Copy.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\HSBC Bank Swift Copy.pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3616
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\HSBC Bank Swift Copy.pdf.exe"
        3⤵
          PID:1096

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2256-128-0x0000000001380000-0x0000000001393000-memory.dmp
      Filesize

      76KB

    • memory/2256-131-0x0000000000F10000-0x00000000010A7000-memory.dmp
      Filesize

      1.6MB

    • memory/2256-130-0x00000000047A0000-0x0000000004AC0000-memory.dmp
      Filesize

      3.1MB

    • memory/2256-129-0x0000000000600000-0x0000000000629000-memory.dmp
      Filesize

      164KB

    • memory/2552-119-0x0000000005270000-0x000000000527A000-memory.dmp
      Filesize

      40KB

    • memory/2552-120-0x0000000005750000-0x000000000575C000-memory.dmp
      Filesize

      48KB

    • memory/2552-121-0x0000000007C70000-0x0000000007D0C000-memory.dmp
      Filesize

      624KB

    • memory/2552-122-0x0000000007DF0000-0x0000000007E52000-memory.dmp
      Filesize

      392KB

    • memory/2552-115-0x0000000000960000-0x0000000000A22000-memory.dmp
      Filesize

      776KB

    • memory/2552-118-0x0000000005270000-0x000000000576E000-memory.dmp
      Filesize

      5.0MB

    • memory/2552-117-0x0000000005310000-0x00000000053A2000-memory.dmp
      Filesize

      584KB

    • memory/2552-116-0x0000000005770000-0x0000000005C6E000-memory.dmp
      Filesize

      5.0MB

    • memory/3060-127-0x0000000002230000-0x0000000002330000-memory.dmp
      Filesize

      1024KB

    • memory/3060-132-0x0000000004320000-0x0000000004480000-memory.dmp
      Filesize

      1.4MB

    • memory/3616-123-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/3616-125-0x0000000001430000-0x0000000001750000-memory.dmp
      Filesize

      3.1MB

    • memory/3616-126-0x0000000001290000-0x0000000001425000-memory.dmp
      Filesize

      1.6MB