Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    16-02-2022 18:34

General

  • Target

    DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe

  • Size

    30KB

  • MD5

    c2ed847cba51543076504a7150261f22

  • SHA1

    93e063e8f777b42cab7f7ed8fa45a2397942dead

  • SHA256

    dfe742ea984310b86ce1d553b87e63f4cdefcf8485b7c860438234377a10a358

  • SHA512

    4dca34f7a0c0ecf2018de5a0e2ba5a9145cfdac508dafa1f5de5fad4072703f6621587b164a742d094cb557e8cedba5630cd7477fbf355a6311ac457c0cb5670

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

po6r

Decoy

jnhuichuangxin.com

mubashir.art

extol.design

doyyindh.xyz

milanoautoexperts.com

4thefringe.com

453511.com

sellathonautocredit.com

velgian.com

6672pk.com

wodeluzhou.com

sumiyoshiku-hizaita.xyz

imoveldeprimeira.com

dgjssp.com

endokc.com

side-clicks.com

cashndashfinancial.com

vanhemelryck.info

agamitrading.com

woofgang.xyz

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1448
    • C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe
        "C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:788
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1672

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/788-68-0x00000000002D0000-0x00000000002E1000-memory.dmp
    Filesize

    68KB

  • memory/788-65-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/788-63-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/788-61-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/788-62-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/788-66-0x0000000000A00000-0x0000000000D03000-memory.dmp
    Filesize

    3.0MB

  • memory/788-67-0x000000000041D000-0x000000000041E000-memory.dmp
    Filesize

    4KB

  • memory/1180-58-0x0000000075831000-0x0000000075833000-memory.dmp
    Filesize

    8KB

  • memory/1180-59-0x0000000005FC0000-0x0000000006076000-memory.dmp
    Filesize

    728KB

  • memory/1180-60-0x00000000048F0000-0x000000000493C000-memory.dmp
    Filesize

    304KB

  • memory/1180-57-0x00000000049E0000-0x00000000049E1000-memory.dmp
    Filesize

    4KB

  • memory/1180-56-0x0000000001060000-0x000000000106E000-memory.dmp
    Filesize

    56KB

  • memory/1180-55-0x000000007445E000-0x000000007445F000-memory.dmp
    Filesize

    4KB

  • memory/1448-75-0x0000000005000000-0x00000000050AA000-memory.dmp
    Filesize

    680KB

  • memory/1448-69-0x0000000006730000-0x0000000006864000-memory.dmp
    Filesize

    1.2MB

  • memory/1672-71-0x0000000000900000-0x0000000000914000-memory.dmp
    Filesize

    80KB

  • memory/1672-72-0x00000000020F0000-0x00000000023F3000-memory.dmp
    Filesize

    3.0MB

  • memory/1672-73-0x0000000000090000-0x00000000000B9000-memory.dmp
    Filesize

    164KB

  • memory/1672-74-0x0000000001E20000-0x0000000001EB0000-memory.dmp
    Filesize

    576KB