Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    17-02-2022 09:27

General

  • Target

    TNT Original Invoice.exe

  • Size

    784KB

  • MD5

    c84db8be1abc6b5c4fe423a2425c9ad6

  • SHA1

    e21d4d9a20e80be6f9310bfc281bd2c8819d2f57

  • SHA256

    3c6a613507d90d332e2d4d7f91c7c2ef3135e464e5937b1da1a9c4f749528343

  • SHA512

    af70ee5050550797a43c49a249c850b543f45ad7998d78ef5fa4d700c66fb2d677e79d213179a64cf23bdc444d2b2ce6c2ba4af129f86fe1127c5e48c94df2cf

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

zqzw

Decoy

laurentmathieu.com

nohohonndana.com

hhmc.info

shophallows.com

blazebunk.com

goodbridge.xyz

flakycloud.com

bakermckenziegroups.com

formation-adistance.com

lovingearthbotanicals.com

tbrservice.plus

heritagehousehotels.com

drwbuildersco.com

lacsghb.com

wain3x.com

dadreview.club

continiutycp.com

cockgirls.com

48mpt.xyz

033skz.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe
    "C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe
      "{path}"
      2⤵
        PID:684
      • C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe
        "{path}"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:904
    • C:\Windows\Explorer.EXE
      C:\Windows\Explorer.EXE
      1⤵
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Windows\SysWOW64\wuapp.exe
        "C:\Windows\SysWOW64\wuapp.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1384
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\TNT Original Invoice.exe"
          3⤵
          • Deletes itself
          PID:1840

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/904-62-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/904-68-0x0000000000310000-0x0000000000321000-memory.dmp
      Filesize

      68KB

    • memory/904-67-0x000000000041D000-0x000000000041E000-memory.dmp
      Filesize

      4KB

    • memory/904-66-0x00000000008A0000-0x0000000000BA3000-memory.dmp
      Filesize

      3.0MB

    • memory/904-65-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/904-63-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/904-61-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1192-60-0x00000000003B0000-0x00000000003E0000-memory.dmp
      Filesize

      192KB

    • memory/1192-55-0x0000000001200000-0x00000000012CA000-memory.dmp
      Filesize

      808KB

    • memory/1192-59-0x0000000004CF0000-0x0000000004D70000-memory.dmp
      Filesize

      512KB

    • memory/1192-58-0x0000000000310000-0x000000000031A000-memory.dmp
      Filesize

      40KB

    • memory/1192-57-0x0000000004D80000-0x0000000004D81000-memory.dmp
      Filesize

      4KB

    • memory/1192-56-0x000000007445E000-0x000000007445F000-memory.dmp
      Filesize

      4KB

    • memory/1384-70-0x0000000001140000-0x000000000114B000-memory.dmp
      Filesize

      44KB

    • memory/1384-71-0x0000000000090000-0x00000000000B9000-memory.dmp
      Filesize

      164KB

    • memory/1384-72-0x0000000000B30000-0x0000000000E33000-memory.dmp
      Filesize

      3.0MB

    • memory/1384-73-0x00000000009D0000-0x0000000000A60000-memory.dmp
      Filesize

      576KB

    • memory/1384-75-0x0000000075831000-0x0000000075833000-memory.dmp
      Filesize

      8KB

    • memory/1448-69-0x00000000073B0000-0x0000000007525000-memory.dmp
      Filesize

      1.5MB

    • memory/1448-74-0x0000000003ED0000-0x0000000003F77000-memory.dmp
      Filesize

      668KB