Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    19-02-2022 23:45

General

  • Target

    ORDER_96.exe

  • Size

    292KB

  • MD5

    d279a9125327264ffc89fb5cb4d8e433

  • SHA1

    44ec118059baa04d7f812ed30f52b15aa138b181

  • SHA256

    e9fe0fe5cd5d59f973f1ea299c3476fbbd9e6a95f44509854286f584a313837c

  • SHA512

    eb7d2a41cb461af28f961f4ae903d56bf730f3307e2bab1e91ac7e4b1b7ab6289f00ee2463f8d2477b9ffaba6e2667ff424628cf2dbc92a88716da98cd9c2db2

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\ORDER_96.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER_96.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1880
      • C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe
        C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe C:\Users\Admin\AppData\Local\Temp\mxshkert
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1100
        • C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe
          C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe C:\Users\Admin\AppData\Local\Temp\mxshkert
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1324
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:272
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe"
        3⤵
          PID:788

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\mxshkert
      MD5

      ecae5b2d514c5d78472341570216ae00

      SHA1

      c227b039d526acee4c8310138820d956543cfd52

      SHA256

      a53679722d3dab88ce636d6efbf4fca91f24ae2e34f6a633dfd107a1c7723f06

      SHA512

      d4f13fe75c874332552a6a57b1a86fafd2c66e002a2c9e242371c595944dce1b9e9699c912ae830248aae0ba5430a4e5e9a10146829be7816dd3b0c889cd17df

    • C:\Users\Admin\AppData\Local\Temp\wmlxw2s6yb6fbgobz89
      MD5

      8ae6f143b01998893484a3eb06aaa969

      SHA1

      0d4515474c8c3639b96e67bc090db1d832e4381c

      SHA256

      5cc34c8ae785417bd302ce53e97a54823a5e4797e1e96611a3b0fc46d452fff1

      SHA512

      7016250f2791e4432a00fa8317cff22a6ab75dc0b7786d59528aac6ebac1ee38b7dcd06ba6ed5fd57f6f2107035a1d728a5d085781c7a3dbe6d53f1d3b24e881

    • C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe
      MD5

      74cf59e346807c24e3fef93eacf51f5d

      SHA1

      2fbff632cad3892cd1629efd93bafaf9ccb2dd2c

      SHA256

      081c10a061264fada3e087f2e6a1b7215872c540daa00960a5c12ebaa53bbfb8

      SHA512

      5a192fea94ecab5bf59c1fc61e5f8c7f650f3a6912d9f54dbe9abbb0dbc228bd24dd12ddd15d127089881885ea1d04d45ef8f8fe9003a82282c640755fe90a4d

    • C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe
      MD5

      74cf59e346807c24e3fef93eacf51f5d

      SHA1

      2fbff632cad3892cd1629efd93bafaf9ccb2dd2c

      SHA256

      081c10a061264fada3e087f2e6a1b7215872c540daa00960a5c12ebaa53bbfb8

      SHA512

      5a192fea94ecab5bf59c1fc61e5f8c7f650f3a6912d9f54dbe9abbb0dbc228bd24dd12ddd15d127089881885ea1d04d45ef8f8fe9003a82282c640755fe90a4d

    • C:\Users\Admin\AppData\Local\Temp\xzwgzw.exe
      MD5

      74cf59e346807c24e3fef93eacf51f5d

      SHA1

      2fbff632cad3892cd1629efd93bafaf9ccb2dd2c

      SHA256

      081c10a061264fada3e087f2e6a1b7215872c540daa00960a5c12ebaa53bbfb8

      SHA512

      5a192fea94ecab5bf59c1fc61e5f8c7f650f3a6912d9f54dbe9abbb0dbc228bd24dd12ddd15d127089881885ea1d04d45ef8f8fe9003a82282c640755fe90a4d

    • \Users\Admin\AppData\Local\Temp\xzwgzw.exe
      MD5

      74cf59e346807c24e3fef93eacf51f5d

      SHA1

      2fbff632cad3892cd1629efd93bafaf9ccb2dd2c

      SHA256

      081c10a061264fada3e087f2e6a1b7215872c540daa00960a5c12ebaa53bbfb8

      SHA512

      5a192fea94ecab5bf59c1fc61e5f8c7f650f3a6912d9f54dbe9abbb0dbc228bd24dd12ddd15d127089881885ea1d04d45ef8f8fe9003a82282c640755fe90a4d

    • \Users\Admin\AppData\Local\Temp\xzwgzw.exe
      MD5

      74cf59e346807c24e3fef93eacf51f5d

      SHA1

      2fbff632cad3892cd1629efd93bafaf9ccb2dd2c

      SHA256

      081c10a061264fada3e087f2e6a1b7215872c540daa00960a5c12ebaa53bbfb8

      SHA512

      5a192fea94ecab5bf59c1fc61e5f8c7f650f3a6912d9f54dbe9abbb0dbc228bd24dd12ddd15d127089881885ea1d04d45ef8f8fe9003a82282c640755fe90a4d

    • memory/272-72-0x0000000000400000-0x0000000000490000-memory.dmp
      Filesize

      576KB

    • memory/272-71-0x0000000002090000-0x0000000002393000-memory.dmp
      Filesize

      3.0MB

    • memory/272-70-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/272-69-0x00000000003B0000-0x00000000003BD000-memory.dmp
      Filesize

      52KB

    • memory/1324-65-0x0000000000860000-0x0000000000B63000-memory.dmp
      Filesize

      3.0MB

    • memory/1324-67-0x00000000002C0000-0x00000000002D1000-memory.dmp
      Filesize

      68KB

    • memory/1324-66-0x000000000041D000-0x000000000041E000-memory.dmp
      Filesize

      4KB

    • memory/1324-64-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1324-61-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1412-68-0x0000000004990000-0x0000000004A88000-memory.dmp
      Filesize

      992KB

    • memory/1412-73-0x0000000006DE0000-0x0000000006F35000-memory.dmp
      Filesize

      1.3MB

    • memory/1880-53-0x0000000075AB1000-0x0000000075AB3000-memory.dmp
      Filesize

      8KB