Analysis

  • max time kernel
    157s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01-02-2022 11:00

General

  • Target

    Order-807190402-pdf.exe

  • Size

    246KB

  • MD5

    68c5e001f8dae53bce2daf4d5480302a

  • SHA1

    697411019d83f22261b31723f994970c33dc1a20

  • SHA256

    b3273dbf7bad4f225c15fbd7728ee709d8ccb1d2e57a3a9942dbc758d2b97c0f

  • SHA512

    155ff406482ff0273b4eb5a18dfc63e36e9ebb4488224acb3b226a3d042d3266ee71c87784776df8059f69bd32cb98b34a79332bb048ecd5f9f43a4f3591745c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Sets service image path in registry 2 TTPs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\Order-807190402-pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Order-807190402-pdf.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3892
      • C:\Users\Admin\AppData\Local\Temp\Order-807190402-pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Order-807190402-pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3948
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:308
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Order-807190402-pdf.exe"
        3⤵
          PID:2576
    • C:\Windows\System32\WaaSMedicAgent.exe
      C:\Windows\System32\WaaSMedicAgent.exe 29a126760f77f966c14ec302bd9f0347 kwQiZ2u1hUyAo79KquAR8A.0.1.0.0.0
      1⤵
      • Modifies data under HKEY_USERS
      PID:2772
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k wusvcs -p
      1⤵
        PID:3952

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\nsdC785.tmp\pwzcmvmisy.dll
        MD5

        0379ef9a1abb13b61faddc0ad714ddb7

        SHA1

        683218b30872825774fcbca3b0f0b3d1f4dfce43

        SHA256

        de69cf6903ef67081ae40034f5b5c571c2df2fc97606f59259dc6129fcf20c33

        SHA512

        d5cfd10f449f5311e575e26c6094cb82d48d04bad4bad45beab67b7bd70d91b00bd5e1a053aca0346c9bfde790e7ca712810c3786c8f37498bf245a24c9a4b9d

      • memory/308-137-0x00000000005A0000-0x00000000005C7000-memory.dmp
        Filesize

        156KB

      • memory/308-138-0x0000000002D60000-0x0000000002D89000-memory.dmp
        Filesize

        164KB

      • memory/308-139-0x0000000004ED0000-0x000000000521A000-memory.dmp
        Filesize

        3.3MB

      • memory/308-140-0x0000000004C70000-0x0000000004D00000-memory.dmp
        Filesize

        576KB

      • memory/2316-135-0x00000000012F0000-0x00000000013E7000-memory.dmp
        Filesize

        988KB

      • memory/2316-141-0x0000000008550000-0x00000000085E5000-memory.dmp
        Filesize

        596KB

      • memory/3892-131-0x00000000022B0000-0x00000000022B2000-memory.dmp
        Filesize

        8KB

      • memory/3948-132-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/3948-134-0x0000000000770000-0x0000000000D7A000-memory.dmp
        Filesize

        6.0MB

      • memory/3948-136-0x00000000006D0000-0x00000000006E1000-memory.dmp
        Filesize

        68KB