Analysis

  • max time kernel
    4294182s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    28-03-2022 11:19

General

  • Target

    RQM6HLsZQYLa9qt.exe

  • Size

    1.3MB

  • MD5

    2d42eded04b592b539951f61742a736a

  • SHA1

    d0c31bc164b18121ceb884859a9a5a5547ee437e

  • SHA256

    02ad8318feb2f8ce745e2cefa321f18d19b7ad72085664371033fada68bd6b91

  • SHA512

    634e5223d883e42be784a02c4882109140ef7a42a781d4142978bf7a3da40ae4c535a5dffca1e26160542338c437fe44ce8f84f8ab32b7df328ad7837517f4ff

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

wdc8

Decoy

mygotomaid.com

joyoushealthandwellnessspa.com

wefundprojects.com

magicbasketbourse.net

vitos3.xyz

oligopoly.city

beauty-bihada.asia

visitnewrichmond.com

crgeniusworld.biz

bantasis.com

transsexual.pro

casagraph.com

eastjamrecords.com

howtotrainyourmustache.com

heiappropriate.xyz

bataperu.com

ces341.com

prajahitha.com

manuelagattegger.com

wolfpackmotorcycletours.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\RQM6HLsZQYLa9qt.exe
    "C:\Users\Admin\AppData\Local\Temp\RQM6HLsZQYLa9qt.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1092
    • C:\Users\Admin\AppData\Local\Temp\RQM6HLsZQYLa9qt.exe
      "C:\Users\Admin\AppData\Local\Temp\RQM6HLsZQYLa9qt.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 968 -s 36
        3⤵
        • Program crash
        PID:2028

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/968-58-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/968-59-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/968-61-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/968-62-0x000000000041D4C0-mapping.dmp
  • memory/1092-54-0x00000000008E0000-0x0000000000A3A000-memory.dmp
    Filesize

    1.4MB

  • memory/1092-55-0x00000000002A0000-0x00000000002AA000-memory.dmp
    Filesize

    40KB

  • memory/1092-56-0x0000000008200000-0x00000000082FA000-memory.dmp
    Filesize

    1000KB

  • memory/1092-57-0x0000000000660000-0x0000000000690000-memory.dmp
    Filesize

    192KB

  • memory/2028-63-0x0000000000000000-mapping.dmp