Analysis

  • max time kernel
    210s
  • max time network
    205s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    09-02-2022 18:35

General

  • Target

    09022022.exe

  • Size

    265KB

  • MD5

    37c86eea298f12684500f2083a2e4e7d

  • SHA1

    4c84e078d068e2a79ddbc48d03459e87390cb756

  • SHA256

    46adc5850ed556d130d5d35db220fc303d45d719960e7e4b4b56174e9cdd3850

  • SHA512

    8a9ea9cf85e375a5b4b50789c6cf1041172400916a045c735987929c52081ff25748bfa404472c580261f8251f37973ba30ecdbc464f0546f702518ff87cd09a

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 43 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\09022022.exe
      "C:\Users\Admin\AppData\Local\Temp\09022022.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
        C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
          C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:432
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe"
        3⤵
          PID:696

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\akvjxtp6f43v
      MD5

      14823dd88a486c9049dc8e39e95e8d6c

      SHA1

      fe4faa49db61f5e4dce75a41bd4e3006b0f2fed8

      SHA256

      ee11c5923f5ec6cc1c3db829cd59d9ee4a3cc85404c68e4ab90177f010eb13c8

      SHA512

      e43f375eb42952580dab5f8acdd81a88e0b8c4de659b0406afd1599bbb044b71a53b353d67615fa4d2a1c7191e1e35d9e58d5ce6bdd18311e74df0f41201b560

    • C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
      MD5

      61c6afe8eb1faafafbe8ee85d527d30e

      SHA1

      c3ec3a8a18ab801d7191ae3c3fc08d1dae3bdf46

      SHA256

      034f1d54ff9954dba589f77cf229352e339424a9f35199f23cb979c05bb889ed

      SHA512

      4eff030db73d65b490ab20e58034f116dc123a24b22dfb9e7d82676544085b314e52148d868f1135b8e9d80ec78c4757b4461ec1fdd42f29fcac1a5e4e5a9591

    • C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
      MD5

      61c6afe8eb1faafafbe8ee85d527d30e

      SHA1

      c3ec3a8a18ab801d7191ae3c3fc08d1dae3bdf46

      SHA256

      034f1d54ff9954dba589f77cf229352e339424a9f35199f23cb979c05bb889ed

      SHA512

      4eff030db73d65b490ab20e58034f116dc123a24b22dfb9e7d82676544085b314e52148d868f1135b8e9d80ec78c4757b4461ec1fdd42f29fcac1a5e4e5a9591

    • C:\Users\Admin\AppData\Local\Temp\qgerjshzns.exe
      MD5

      61c6afe8eb1faafafbe8ee85d527d30e

      SHA1

      c3ec3a8a18ab801d7191ae3c3fc08d1dae3bdf46

      SHA256

      034f1d54ff9954dba589f77cf229352e339424a9f35199f23cb979c05bb889ed

      SHA512

      4eff030db73d65b490ab20e58034f116dc123a24b22dfb9e7d82676544085b314e52148d868f1135b8e9d80ec78c4757b4461ec1fdd42f29fcac1a5e4e5a9591

    • C:\Users\Admin\AppData\Local\Temp\uxxvuqyvja
      MD5

      43572ef3180d3c5c33a5cf9d62a6d696

      SHA1

      e079bf345f9b9133ecc1813839c4182ee6285802

      SHA256

      3a09220007d41f44063d266b9cf59c30e85b22e3bf33546c272046f32ea32abe

      SHA512

      9045ef3ea42ed91767e7b70c1e7641aaa44f2c6bd9a83f6db301a691b88e4e7e015e77fc6f578f49fad51f8e582563fa3fb68d8013c4078e3a62078b7684d7bd

    • \Users\Admin\AppData\Local\Temp\qgerjshzns.exe
      MD5

      61c6afe8eb1faafafbe8ee85d527d30e

      SHA1

      c3ec3a8a18ab801d7191ae3c3fc08d1dae3bdf46

      SHA256

      034f1d54ff9954dba589f77cf229352e339424a9f35199f23cb979c05bb889ed

      SHA512

      4eff030db73d65b490ab20e58034f116dc123a24b22dfb9e7d82676544085b314e52148d868f1135b8e9d80ec78c4757b4461ec1fdd42f29fcac1a5e4e5a9591

    • \Users\Admin\AppData\Local\Temp\qgerjshzns.exe
      MD5

      61c6afe8eb1faafafbe8ee85d527d30e

      SHA1

      c3ec3a8a18ab801d7191ae3c3fc08d1dae3bdf46

      SHA256

      034f1d54ff9954dba589f77cf229352e339424a9f35199f23cb979c05bb889ed

      SHA512

      4eff030db73d65b490ab20e58034f116dc123a24b22dfb9e7d82676544085b314e52148d868f1135b8e9d80ec78c4757b4461ec1fdd42f29fcac1a5e4e5a9591

    • \Users\Admin\AppData\Local\Temp\qgerjshzns.exe
      MD5

      61c6afe8eb1faafafbe8ee85d527d30e

      SHA1

      c3ec3a8a18ab801d7191ae3c3fc08d1dae3bdf46

      SHA256

      034f1d54ff9954dba589f77cf229352e339424a9f35199f23cb979c05bb889ed

      SHA512

      4eff030db73d65b490ab20e58034f116dc123a24b22dfb9e7d82676544085b314e52148d868f1135b8e9d80ec78c4757b4461ec1fdd42f29fcac1a5e4e5a9591

    • memory/432-64-0x0000000000770000-0x0000000000A73000-memory.dmp
      Filesize

      3.0MB

    • memory/432-70-0x000000000041D000-0x000000000041E000-memory.dmp
      Filesize

      4KB

    • memory/432-71-0x00000000005C0000-0x00000000005D1000-memory.dmp
      Filesize

      68KB

    • memory/432-67-0x00000000003D0000-0x00000000003E1000-memory.dmp
      Filesize

      68KB

    • memory/432-66-0x000000000041D000-0x000000000041E000-memory.dmp
      Filesize

      4KB

    • memory/432-62-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/432-69-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1192-68-0x0000000007B40000-0x0000000007CC4000-memory.dmp
      Filesize

      1.5MB

    • memory/1192-72-0x0000000007CD0000-0x0000000007E5F000-memory.dmp
      Filesize

      1.6MB

    • memory/1192-77-0x0000000004DD0000-0x0000000004EC9000-memory.dmp
      Filesize

      996KB

    • memory/1600-54-0x0000000075471000-0x0000000075473000-memory.dmp
      Filesize

      8KB

    • memory/1864-73-0x0000000000AB0000-0x0000000000ACB000-memory.dmp
      Filesize

      108KB

    • memory/1864-74-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1864-75-0x0000000002060000-0x0000000002363000-memory.dmp
      Filesize

      3.0MB

    • memory/1864-76-0x00000000004D0000-0x0000000000560000-memory.dmp
      Filesize

      576KB