Analysis

  • max time kernel
    163s
  • max time network
    173s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    20-04-2022 09:10

General

  • Target

    SKM_1504322RS.exe

  • Size

    192KB

  • MD5

    d382db9d903f52d9f2f7eb2c1039b824

  • SHA1

    c2e97ed52203259715f51ee9844176e18ea2cbbe

  • SHA256

    59552104d4bb2bcc6518dab735dac7dbb731a988dda8b82d39fa10911e7b8ee3

  • SHA512

    93711c47076a3c90d63ecf79b5d17a4a0f188cc7fd790f9af0740ee0907876fdbbc33da4e84a0f1b85050e9a00b0f05a592a78c0822b8251d3011f50427e56b3

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3292
    • C:\Users\Admin\AppData\Local\Temp\SKM_1504322RS.exe
      "C:\Users\Admin\AppData\Local\Temp\SKM_1504322RS.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1580
      • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
        C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe C:\Users\Admin\AppData\Local\Temp\gnpqzaioa
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4040
        • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
          C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe C:\Users\Admin\AppData\Local\Temp\gnpqzaioa
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4496
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe"
        3⤵
          PID:1076

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8cqj5cdlj81hkk3c7l9r
      Filesize

      163KB

      MD5

      61f525c1ae1801219dfcde26c37fdde5

      SHA1

      a8e554afd2e639eb8aa593cf7ca8aea3d164a8c4

      SHA256

      ae49d13b232b43d23d78fd63570e8de611408418e69058c4f9e02bb88ecd7dc3

      SHA512

      3f44fa452d6f70003952b7e7450407f539b5a6d1f4cbae97a16ae96a420906828d2b5f7aad287ff927f90dc9b1e7f175210b04b6a5b1b7ef1a7d3648bce8645c

    • C:\Users\Admin\AppData\Local\Temp\gnpqzaioa
      Filesize

      5KB

      MD5

      40e7f44b50a0bbbbeed2861f98742d91

      SHA1

      842279d94e7205fed6a4ebba1b1fadccfe9baa12

      SHA256

      c512a420c4249e82ab53f60eafa5baff40e7bfde342bb8cad06233ce8bb58cb5

      SHA512

      04b701517dead6f6ebfe4a41f7482b84c05782cdde5623f9f31bffafad0e37cd309dde7c3603aeb361b0814a15f016ac2de1bbff02c548512b2d11f48f61eada

    • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • memory/1076-148-0x0000000000000000-mapping.dmp
    • memory/3292-143-0x00000000039B0000-0x0000000003A9C000-memory.dmp
      Filesize

      944KB

    • memory/3292-150-0x0000000008D10000-0x0000000008E86000-memory.dmp
      Filesize

      1.5MB

    • memory/4040-135-0x00000000009A0000-0x00000000009A2000-memory.dmp
      Filesize

      8KB

    • memory/4040-130-0x0000000000000000-mapping.dmp
    • memory/4368-149-0x00000000020B0000-0x0000000002140000-memory.dmp
      Filesize

      576KB

    • memory/4368-145-0x0000000000A80000-0x0000000000A8C000-memory.dmp
      Filesize

      48KB

    • memory/4368-147-0x0000000002380000-0x00000000026CA000-memory.dmp
      Filesize

      3.3MB

    • memory/4368-144-0x0000000000000000-mapping.dmp
    • memory/4368-146-0x0000000000120000-0x0000000000149000-memory.dmp
      Filesize

      164KB

    • memory/4496-136-0x0000000000000000-mapping.dmp
    • memory/4496-142-0x0000000000500000-0x0000000000511000-memory.dmp
      Filesize

      68KB

    • memory/4496-141-0x0000000000AA0000-0x0000000000DEA000-memory.dmp
      Filesize

      3.3MB

    • memory/4496-140-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/4496-137-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB