Analysis

  • max time kernel
    157s
  • max time network
    58s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    03-02-2022 08:32

General

  • Target

    tS1DhARF4HLvLA6.exe

  • Size

    466KB

  • MD5

    d88a53faab7f22298b69de606e38894c

  • SHA1

    6472dc71a4b6d1cb508d22676656b99e2ee2c3f9

  • SHA256

    e001e6df4c7f72792f62e8a6c85f7061589071eae796aff8c96343a25b9641f8

  • SHA512

    92bfc7130b0e2fb93da0ec1bb044198d2f7b3aa8c00b878ed95f312e597542ad7c84f13bb13fca369a4412181b674f3640c1b4eea230c343a0ea27b157d7b2c0

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

cbgo

Decoy

tablescaperendezvous4two.net

abktransportllc.net

roseevision.com

skategrindingwheels.com

robux-generator-free.xyz

yacusi.com

mgav35.xyz

paravocecommerce.com

venkatramanrm.com

freakyhamster.com

jenaashoponline.com

dmozlisting.com

lorrainekclark.store

handyman-prime.com

thecrashingbrains.com

ukpms.com

livingstonemines.com

papeisonline.com

chrisbakerpr.com

omnipets.store

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\tS1DhARF4HLvLA6.exe
      "C:\Users\Admin\AppData\Local\Temp\tS1DhARF4HLvLA6.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Users\Admin\AppData\Local\Temp\tS1DhARF4HLvLA6.exe
        "C:\Users\Admin\AppData\Local\Temp\tS1DhARF4HLvLA6.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:564
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\tS1DhARF4HLvLA6.exe"
        3⤵
        • Deletes itself
        PID:756

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/564-68-0x00000000003E0000-0x00000000003F1000-memory.dmp
    Filesize

    68KB

  • memory/564-62-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/564-64-0x0000000000B10000-0x0000000000E13000-memory.dmp
    Filesize

    3.0MB

  • memory/564-67-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/564-65-0x00000000002A0000-0x00000000002B1000-memory.dmp
    Filesize

    68KB

  • memory/564-60-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/564-61-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/612-59-0x0000000004F60000-0x0000000004FBE000-memory.dmp
    Filesize

    376KB

  • memory/612-57-0x00000000022A0000-0x00000000022A1000-memory.dmp
    Filesize

    4KB

  • memory/612-56-0x0000000076921000-0x0000000076923000-memory.dmp
    Filesize

    8KB

  • memory/612-58-0x0000000000270000-0x0000000000284000-memory.dmp
    Filesize

    80KB

  • memory/612-55-0x0000000000900000-0x000000000097A000-memory.dmp
    Filesize

    488KB

  • memory/1072-70-0x0000000000510000-0x000000000051D000-memory.dmp
    Filesize

    52KB

  • memory/1072-71-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/1072-72-0x0000000001F60000-0x0000000002263000-memory.dmp
    Filesize

    3.0MB

  • memory/1412-66-0x00000000067D0000-0x00000000068D0000-memory.dmp
    Filesize

    1024KB

  • memory/1412-69-0x0000000007200000-0x00000000072DB000-memory.dmp
    Filesize

    876KB