Analysis

  • max time kernel
    152s
  • max time network
    162s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    09-02-2022 16:16

General

  • Target

    8893fe00e5bfd3794018c17254c26375.exe

  • Size

    820KB

  • MD5

    8893fe00e5bfd3794018c17254c26375

  • SHA1

    2921a9af9980c6e63549aa23f396e61c8aff916a

  • SHA256

    cba2f725d2b6b4212d2e8ba58b7e26e59e3276065d1f58fd11eeeaf0dfb15aeb

  • SHA512

    9a9c58191ff5ec3dac4d5e2d3f7acdfdb67d180705cf59350eab2f01b2b553ce9627e66da198b2122eb9ff3e8d7d9208ec66c2e398e6a55feda479b22919e267

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

dpzz

Decoy

roadstown.com

idfaltd.com

infotechsearchgroup.com

elcuentodelaprincesa.com

youkutiyu88.com

wildparkresort.com

iss-sa.com

jmglaser.com

criticalthinking.store

cabinetsossa.com

satseconomy.com

newendtech.com

gran-piel.com

accoya.net

timothyschmallrealt.com

valentikaeventos.com

majestineprojector.com

love-austria.com

hermetikyogusmalikombi.com

karasevda-jor.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8893fe00e5bfd3794018c17254c26375.exe
    "C:\Users\Admin\AppData\Local\Temp\8893fe00e5bfd3794018c17254c26375.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2228
    • C:\Users\Admin\AppData\Local\Temp\8893fe00e5bfd3794018c17254c26375.exe
      "C:\Users\Admin\AppData\Local\Temp\8893fe00e5bfd3794018c17254c26375.exe"
      2⤵
        PID:4608
      • C:\Users\Admin\AppData\Local\Temp\8893fe00e5bfd3794018c17254c26375.exe
        "C:\Users\Admin\AppData\Local\Temp\8893fe00e5bfd3794018c17254c26375.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4616
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:2384
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3596

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2228-130-0x0000000000270000-0x0000000000344000-memory.dmp
      Filesize

      848KB

    • memory/2228-131-0x0000000005080000-0x0000000005624000-memory.dmp
      Filesize

      5.6MB

    • memory/2228-132-0x0000000004BB0000-0x0000000004C42000-memory.dmp
      Filesize

      584KB

    • memory/2228-133-0x0000000074BDE000-0x0000000074BDF000-memory.dmp
      Filesize

      4KB

    • memory/2228-134-0x0000000004C50000-0x0000000004C5A000-memory.dmp
      Filesize

      40KB

    • memory/2228-135-0x0000000004E10000-0x0000000004E11000-memory.dmp
      Filesize

      4KB

    • memory/2228-139-0x0000000006FB0000-0x000000000704C000-memory.dmp
      Filesize

      624KB

    • memory/2384-136-0x000002081F7A0000-0x000002081F7B0000-memory.dmp
      Filesize

      64KB

    • memory/2384-137-0x000002081FE20000-0x000002081FE30000-memory.dmp
      Filesize

      64KB

    • memory/2384-138-0x0000020822520000-0x0000020822524000-memory.dmp
      Filesize

      16KB

    • memory/4616-140-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/4616-141-0x00000000014A0000-0x00000000017EA000-memory.dmp
      Filesize

      3.3MB