Analysis

  • max time kernel
    162s
  • max time network
    176s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    30-01-2022 16:05

General

  • Target

    Inquiry 21.1.2021.exe

  • Size

    800KB

  • MD5

    059c56876497cfe76c5fd67bb83fd8a6

  • SHA1

    d0c8bcffd9a9393e02afa12d0d1d6da3f5ae5426

  • SHA256

    df52f3046504a1273cebafc03bb13ea024b81964eb78a6dbd118478a7c9ce8b4

  • SHA512

    06ce3b9bb8d3c80efae131ec7c5c17168f2ca78b177e94c79b1ef3b36d8b8ab87c1da86468419017aaf34cdcf45e71a6666715014a5d3a5811194939367dfcd5

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

kio8

Decoy

greeaircondition.com

thewilmingtonguide.com

cbluedotlivewdmall.com

globalcrime24.com

heightsplace.com

ghar.pro

asosbira.com

melolandia.com

velactun.com

erniesimms.com

nutbullet.com

drizzerstr.com

hnqym888.com

ghorowaseba.com

1317efoxchasedrive.info

stjudetroop623.com

facestaj.com

airpromaskaccessories.com

wolfetailors.com

56ohdc2016.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe
      "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1020
      • C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe
        "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
        3⤵
          PID:1648
        • C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe
          "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1700
      • C:\Windows\SysWOW64\systray.exe
        "C:\Windows\SysWOW64\systray.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:3352
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Inquiry 21.1.2021.exe"
          3⤵
            PID:608

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1020-115-0x0000000000430000-0x00000000004FE000-memory.dmp
        Filesize

        824KB

      • memory/1020-116-0x0000000004E80000-0x0000000004F1C000-memory.dmp
        Filesize

        624KB

      • memory/1020-117-0x0000000005420000-0x000000000591E000-memory.dmp
        Filesize

        5.0MB

      • memory/1020-118-0x0000000004FC0000-0x0000000005052000-memory.dmp
        Filesize

        584KB

      • memory/1020-119-0x0000000004E40000-0x0000000004E4A000-memory.dmp
        Filesize

        40KB

      • memory/1020-120-0x0000000005120000-0x0000000005176000-memory.dmp
        Filesize

        344KB

      • memory/1020-121-0x0000000004F20000-0x000000000541E000-memory.dmp
        Filesize

        5.0MB

      • memory/1020-122-0x0000000005BD0000-0x0000000005BF8000-memory.dmp
        Filesize

        160KB

      • memory/1020-123-0x0000000000DE0000-0x0000000000E4E000-memory.dmp
        Filesize

        440KB

      • memory/1700-127-0x0000000000E10000-0x0000000000F5A000-memory.dmp
        Filesize

        1.3MB

      • memory/1700-124-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/1700-126-0x0000000001270000-0x0000000001590000-memory.dmp
        Filesize

        3.1MB

      • memory/1700-129-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/1700-130-0x00000000010D0000-0x0000000001269000-memory.dmp
        Filesize

        1.6MB

      • memory/2928-128-0x0000000000670000-0x0000000000734000-memory.dmp
        Filesize

        784KB

      • memory/2928-131-0x0000000001FE0000-0x000000000208F000-memory.dmp
        Filesize

        700KB

      • memory/2928-136-0x0000000005F40000-0x0000000006052000-memory.dmp
        Filesize

        1.1MB

      • memory/3352-133-0x0000000000420000-0x0000000000449000-memory.dmp
        Filesize

        164KB

      • memory/3352-132-0x0000000000840000-0x0000000000846000-memory.dmp
        Filesize

        24KB

      • memory/3352-134-0x0000000004330000-0x0000000004650000-memory.dmp
        Filesize

        3.1MB

      • memory/3352-135-0x0000000004190000-0x000000000432F000-memory.dmp
        Filesize

        1.6MB