Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    16-02-2022 09:28

General

  • Target

    918d148a95ceffbf6cf619106cbbc49f.exe

  • Size

    456KB

  • MD5

    918d148a95ceffbf6cf619106cbbc49f

  • SHA1

    32075f31064cbd71e820f9c5a9b1c41e357b17ea

  • SHA256

    826837df6dde8385f31f1a25df7ebdf946b9519af3142bfb87d4b9196f3822f1

  • SHA512

    25d415e45b326d5db660326124fdc189fb1d17198159197ad2ab953bed979116fd743f49d122a7ef70c9735fdef3dc89893ddebe10b950dc88152d75578f2fb7

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\918d148a95ceffbf6cf619106cbbc49f.exe
      "C:\Users\Admin\AppData\Local\Temp\918d148a95ceffbf6cf619106cbbc49f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe
        C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe C:\Users\Admin\AppData\Local\Temp\tuxdcz
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1544
        • C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe
          C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe C:\Users\Admin\AppData\Local\Temp\tuxdcz
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:396
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2812
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe"
        3⤵
          PID:3048
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3176
    • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
      C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
      1⤵
      • Drops file in Windows directory
      • Suspicious use of AdjustPrivilegeToken
      PID:3112

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\2j798lhbkkt8o
      MD5

      5897b68ea51360f25b31986115a60c72

      SHA1

      386a004a13238e3b53c3da1c81bd384cde7d2d90

      SHA256

      dea8c97f4b58274c9570973c711827c5fef1532fed038ca257b9fab11539b6b9

      SHA512

      7227d24cc4b94734174ba4a02e7a0121f741b59bcbdca7472ac65eb5ee2b22c9ed197012c9788494a4176b78bfcfaaebd5e2c595395f0f8a539a76d6863461b8

    • C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe
      MD5

      955edc4ecea413644f41bf421dd4a028

      SHA1

      2e1d9ed0913b4322dd75fd105797e0db71257348

      SHA256

      4223aca1a531e0afa67b04d04cfc5b9669c2be413963ae525204ec0dc607bd5b

      SHA512

      953753141654b22c877ab7a383a458d72803ee3437e19ba5f54249b7247e80ce34a318d48d1992e298ee18d8a8204146da26c1ffb91ba200f3e1813dfd003c51

    • C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe
      MD5

      955edc4ecea413644f41bf421dd4a028

      SHA1

      2e1d9ed0913b4322dd75fd105797e0db71257348

      SHA256

      4223aca1a531e0afa67b04d04cfc5b9669c2be413963ae525204ec0dc607bd5b

      SHA512

      953753141654b22c877ab7a383a458d72803ee3437e19ba5f54249b7247e80ce34a318d48d1992e298ee18d8a8204146da26c1ffb91ba200f3e1813dfd003c51

    • C:\Users\Admin\AppData\Local\Temp\hhdaghixs.exe
      MD5

      955edc4ecea413644f41bf421dd4a028

      SHA1

      2e1d9ed0913b4322dd75fd105797e0db71257348

      SHA256

      4223aca1a531e0afa67b04d04cfc5b9669c2be413963ae525204ec0dc607bd5b

      SHA512

      953753141654b22c877ab7a383a458d72803ee3437e19ba5f54249b7247e80ce34a318d48d1992e298ee18d8a8204146da26c1ffb91ba200f3e1813dfd003c51

    • C:\Users\Admin\AppData\Local\Temp\tuxdcz
      MD5

      492c9af9536eb9f00d2d0624d018a235

      SHA1

      07247a0540a7853c1d93a36534f689ac74f3f366

      SHA256

      36a9d2e4f8e91485db0499be77931a5cfaf622d55c2ef2b0b22c992d777298a9

      SHA512

      1a21f99ff5cbe97a4e819f18d22e97651fc4e5cf0f88ee8a1cb19d51695bb312bf063628afdbf0e24b59aa00143226c6e3fb1a795110dbcfdae6b61c73c39492

    • memory/396-146-0x0000000001400000-0x0000000001411000-memory.dmp
      Filesize

      68KB

    • memory/396-144-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/396-137-0x00000000018F0000-0x0000000001C3A000-memory.dmp
      Filesize

      3.3MB

    • memory/396-139-0x00000000013A0000-0x00000000013B1000-memory.dmp
      Filesize

      68KB

    • memory/396-138-0x000000000041D000-0x000000000041E000-memory.dmp
      Filesize

      4KB

    • memory/396-134-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/396-145-0x000000000041D000-0x000000000041E000-memory.dmp
      Filesize

      4KB

    • memory/2812-149-0x00000000007C0000-0x00000000007E9000-memory.dmp
      Filesize

      164KB

    • memory/2812-148-0x0000000000570000-0x0000000000586000-memory.dmp
      Filesize

      88KB

    • memory/2812-150-0x00000000029F0000-0x0000000002D3A000-memory.dmp
      Filesize

      3.3MB

    • memory/2812-151-0x0000000002740000-0x00000000027D0000-memory.dmp
      Filesize

      576KB

    • memory/3020-147-0x0000000009240000-0x00000000093AD000-memory.dmp
      Filesize

      1.4MB

    • memory/3020-140-0x0000000008A70000-0x0000000008B77000-memory.dmp
      Filesize

      1.0MB

    • memory/3020-152-0x000000000AAF0000-0x000000000AC34000-memory.dmp
      Filesize

      1.3MB

    • memory/3176-143-0x0000022789600000-0x0000022789604000-memory.dmp
      Filesize

      16KB

    • memory/3176-142-0x0000022786F20000-0x0000022786F30000-memory.dmp
      Filesize

      64KB

    • memory/3176-141-0x0000022786980000-0x0000022786990000-memory.dmp
      Filesize

      64KB