Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    30-01-2022 16:05

General

  • Target

    Inquiry 21.1.2021.exe

  • Size

    800KB

  • MD5

    059c56876497cfe76c5fd67bb83fd8a6

  • SHA1

    d0c8bcffd9a9393e02afa12d0d1d6da3f5ae5426

  • SHA256

    df52f3046504a1273cebafc03bb13ea024b81964eb78a6dbd118478a7c9ce8b4

  • SHA512

    06ce3b9bb8d3c80efae131ec7c5c17168f2ca78b177e94c79b1ef3b36d8b8ab87c1da86468419017aaf34cdcf45e71a6666715014a5d3a5811194939367dfcd5

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

kio8

Decoy

greeaircondition.com

thewilmingtonguide.com

cbluedotlivewdmall.com

globalcrime24.com

heightsplace.com

ghar.pro

asosbira.com

melolandia.com

velactun.com

erniesimms.com

nutbullet.com

drizzerstr.com

hnqym888.com

ghorowaseba.com

1317efoxchasedrive.info

stjudetroop623.com

facestaj.com

airpromaskaccessories.com

wolfetailors.com

56ohdc2016.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe
      "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe
        "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
        3⤵
          PID:456
        • C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe
          "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1096
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:980
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
          3⤵
          • Deletes itself
          PID:1872

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/980-66-0x0000000000300000-0x000000000030D000-memory.dmp
      Filesize

      52KB

    • memory/980-69-0x0000000001D80000-0x0000000001E0F000-memory.dmp
      Filesize

      572KB

    • memory/980-68-0x0000000002050000-0x0000000002353000-memory.dmp
      Filesize

      3.0MB

    • memory/980-67-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1096-63-0x0000000000890000-0x0000000000C93000-memory.dmp
      Filesize

      4.0MB

    • memory/1096-59-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1096-60-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1096-61-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1096-64-0x00000000000B0000-0x00000000000C0000-memory.dmp
      Filesize

      64KB

    • memory/1228-65-0x0000000004200000-0x00000000042FF000-memory.dmp
      Filesize

      1020KB

    • memory/1228-70-0x0000000007310000-0x0000000007484000-memory.dmp
      Filesize

      1.5MB

    • memory/1580-54-0x00000000002C0000-0x000000000038E000-memory.dmp
      Filesize

      824KB

    • memory/1580-58-0x0000000005280000-0x00000000052EE000-memory.dmp
      Filesize

      440KB

    • memory/1580-57-0x0000000000460000-0x0000000000488000-memory.dmp
      Filesize

      160KB

    • memory/1580-56-0x0000000004E00000-0x0000000004E01000-memory.dmp
      Filesize

      4KB

    • memory/1580-55-0x00000000763F1000-0x00000000763F3000-memory.dmp
      Filesize

      8KB