Analysis

  • max time kernel
    145s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    23-04-2022 11:28

General

  • Target

    SKM_1504322RS.exe

  • Size

    192KB

  • MD5

    d382db9d903f52d9f2f7eb2c1039b824

  • SHA1

    c2e97ed52203259715f51ee9844176e18ea2cbbe

  • SHA256

    59552104d4bb2bcc6518dab735dac7dbb731a988dda8b82d39fa10911e7b8ee3

  • SHA512

    93711c47076a3c90d63ecf79b5d17a4a0f188cc7fd790f9af0740ee0907876fdbbc33da4e84a0f1b85050e9a00b0f05a592a78c0822b8251d3011f50427e56b3

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahc8

Decoy

192451.com

wwwripostes.net

sirikhalsalaw.com

bitterbaybay.com

stella-scrubs.com

almanecermezcal.com

goodgood.online

translate-now.online

sincerefilm.com

quadrantforensics.com

johnfrenchart.com

plick-click.com

alnileen.com

tghi.xyz

172711.com

maymakita.com

punnyaseva.com

ukash-online.com

sho-yururi-blog.com

hebergement-solidaire.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\SKM_1504322RS.exe
      "C:\Users\Admin\AppData\Local\Temp\SKM_1504322RS.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
        C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe C:\Users\Admin\AppData\Local\Temp\gnpqzaioa
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2020
        • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
          C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe C:\Users\Admin\AppData\Local\Temp\gnpqzaioa
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1248
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe"
        3⤵
          PID:1348

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\8cqj5cdlj81hkk3c7l9r
      Filesize

      163KB

      MD5

      61f525c1ae1801219dfcde26c37fdde5

      SHA1

      a8e554afd2e639eb8aa593cf7ca8aea3d164a8c4

      SHA256

      ae49d13b232b43d23d78fd63570e8de611408418e69058c4f9e02bb88ecd7dc3

      SHA512

      3f44fa452d6f70003952b7e7450407f539b5a6d1f4cbae97a16ae96a420906828d2b5f7aad287ff927f90dc9b1e7f175210b04b6a5b1b7ef1a7d3648bce8645c

    • C:\Users\Admin\AppData\Local\Temp\gnpqzaioa
      Filesize

      5KB

      MD5

      40e7f44b50a0bbbbeed2861f98742d91

      SHA1

      842279d94e7205fed6a4ebba1b1fadccfe9baa12

      SHA256

      c512a420c4249e82ab53f60eafa5baff40e7bfde342bb8cad06233ce8bb58cb5

      SHA512

      04b701517dead6f6ebfe4a41f7482b84c05782cdde5623f9f31bffafad0e37cd309dde7c3603aeb361b0814a15f016ac2de1bbff02c548512b2d11f48f61eada

    • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • C:\Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • \Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • \Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • \Users\Admin\AppData\Local\Temp\wiecpplnw.exe
      Filesize

      4KB

      MD5

      73e2a848522ee8bef850a9f76b51732a

      SHA1

      7f2a15c92a16601334f18509a05f9147dddefad7

      SHA256

      852f7e6d06eee3f482c6b2e0ddc948c57f9b6970b4e19882e026f777a686d922

      SHA512

      e7e3f4aa0281fa3dc6e9151f9b6ff0816dc9abb92a2594458abdf3af77b5d4688d7ce46b2bf7b48d8f4535ef9daff7d4b14c0b3fc2b49c0e9e977aae950a555d

    • memory/1232-71-0x0000000005F80000-0x000000000609C000-memory.dmp
      Filesize

      1.1MB

    • memory/1232-79-0x00000000060A0000-0x00000000061AC000-memory.dmp
      Filesize

      1.0MB

    • memory/1248-69-0x0000000000910000-0x0000000000C13000-memory.dmp
      Filesize

      3.0MB

    • memory/1248-65-0x000000000041D4F0-mapping.dmp
    • memory/1248-68-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1248-70-0x0000000000340000-0x0000000000351000-memory.dmp
      Filesize

      68KB

    • memory/1248-64-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1348-74-0x0000000000000000-mapping.dmp
    • memory/1524-72-0x0000000000000000-mapping.dmp
    • memory/1524-75-0x0000000000BF0000-0x0000000000C0F000-memory.dmp
      Filesize

      124KB

    • memory/1524-77-0x0000000002010000-0x0000000002313000-memory.dmp
      Filesize

      3.0MB

    • memory/1524-76-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1524-78-0x0000000000880000-0x0000000000910000-memory.dmp
      Filesize

      576KB

    • memory/2020-57-0x0000000000000000-mapping.dmp
    • memory/2032-54-0x00000000759F1000-0x00000000759F3000-memory.dmp
      Filesize

      8KB