Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-05-2022 14:28

General

  • Target

    tmp.exe

  • Size

    193KB

  • MD5

    4ef1cf561792490cfc119a6f4b9433cc

  • SHA1

    6c7cfb9a79edeba7859088ca1a1f9da6d236facb

  • SHA256

    25148c38c34edf03d8c2610e75188f9223421978e0a73eec5c8a303ca1280d07

  • SHA512

    ba4d5b504491e9ed078b51235c3f1a6af7ff769a70ff6127297a03c299a6fe8f7ea1bdea158ff2624d2e9949125a3802255350e748ee263befc9e820e9530813

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

bs8f

Decoy

atmospheraglobal.com

dontshootima.com

bestofferusde.club

yourdigitalboss.com

breskizci.com

myarrovacoastwebsite.com

reasclerk.com

efrovida.com

wsmz.net

upneett.com

loefflerforgov.com

noida.info

trndystore.com

arhaldar.online

vivibanca.tech

mykrema.com

vseserialy.online

ridgewayinsua.com

heauxland.com

bestcollegecourses.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1060
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe
        C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe C:\Users\Admin\AppData\Local\Temp\qwzjl
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe
          C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe C:\Users\Admin\AppData\Local\Temp\qwzjl
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4576
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4544
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe"
        3⤵
          PID:1344

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe
      Filesize

      6KB

      MD5

      cea873373b350445440e7333d45a2735

      SHA1

      4ee5af4ce6b5cb191cbc2880a7b8259287b92b5d

      SHA256

      d2b2d63ba5a80cf8bda26906d44f868d0a36f5e62f5fc5f8009ccc7c1cb20f79

      SHA512

      fa4e11fdd7c4d816413ee63e464210cec74ae871ed5ccbaebb0003be37b90ac0934eb6840e8e5d6098661e6df7c552c7e7e0aaebf302fcbc847070dfdf7a3c8f

    • C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe
      Filesize

      6KB

      MD5

      cea873373b350445440e7333d45a2735

      SHA1

      4ee5af4ce6b5cb191cbc2880a7b8259287b92b5d

      SHA256

      d2b2d63ba5a80cf8bda26906d44f868d0a36f5e62f5fc5f8009ccc7c1cb20f79

      SHA512

      fa4e11fdd7c4d816413ee63e464210cec74ae871ed5ccbaebb0003be37b90ac0934eb6840e8e5d6098661e6df7c552c7e7e0aaebf302fcbc847070dfdf7a3c8f

    • C:\Users\Admin\AppData\Local\Temp\lilaxqbb.exe
      Filesize

      6KB

      MD5

      cea873373b350445440e7333d45a2735

      SHA1

      4ee5af4ce6b5cb191cbc2880a7b8259287b92b5d

      SHA256

      d2b2d63ba5a80cf8bda26906d44f868d0a36f5e62f5fc5f8009ccc7c1cb20f79

      SHA512

      fa4e11fdd7c4d816413ee63e464210cec74ae871ed5ccbaebb0003be37b90ac0934eb6840e8e5d6098661e6df7c552c7e7e0aaebf302fcbc847070dfdf7a3c8f

    • C:\Users\Admin\AppData\Local\Temp\qwzjl
      Filesize

      4KB

      MD5

      ad85e1abe255b453282baaf817b34bba

      SHA1

      f2f40b78535012f337ec9f5983276f24c113d0a7

      SHA256

      5b3e0f559d470993d2fce051bc09aa813f37c700da400491644a6ef5461ac0e9

      SHA512

      375728e3eac5b19c105633012c3a0085d114c6afbbc7a8ad2c57df3f29addf2a7b37a83be5ada408f9fd0cd81c16864bb1304d1be5b5ac912f3847149515a456

    • C:\Users\Admin\AppData\Local\Temp\scijh7u2xhl2xtr17r
      Filesize

      163KB

      MD5

      dafb005f8fd0eef3d0c507a92401a547

      SHA1

      3688605f1c694b693c6e6cca6701feb3f7047ff6

      SHA256

      b29edd425a3f3cf35ff5d21fda608732929b714e4b23f63f51df2bc2298bc659

      SHA512

      dbed72bdf6cdb812bba4c7b13ba1fbacfcae5b696758febfc2305d9fcf6bf207f374afbb433f38ab7d11ac010c62e804cfe0d4df173590e9fc4a1d3d6eb4d091

    • memory/1060-148-0x0000000002760000-0x000000000284D000-memory.dmp
      Filesize

      948KB

    • memory/1060-141-0x0000000008360000-0x0000000008500000-memory.dmp
      Filesize

      1.6MB

    • memory/1344-143-0x0000000000000000-mapping.dmp
    • memory/2588-130-0x0000000000000000-mapping.dmp
    • memory/4544-142-0x0000000000000000-mapping.dmp
    • memory/4544-144-0x0000000000710000-0x000000000084A000-memory.dmp
      Filesize

      1.2MB

    • memory/4544-145-0x0000000000580000-0x00000000005A9000-memory.dmp
      Filesize

      164KB

    • memory/4544-146-0x0000000002910000-0x0000000002C5A000-memory.dmp
      Filesize

      3.3MB

    • memory/4544-147-0x00000000026B0000-0x0000000002740000-memory.dmp
      Filesize

      576KB

    • memory/4576-139-0x00000000009F0000-0x0000000000D3A000-memory.dmp
      Filesize

      3.3MB

    • memory/4576-140-0x00000000006D0000-0x00000000006E1000-memory.dmp
      Filesize

      68KB

    • memory/4576-136-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/4576-135-0x0000000000000000-mapping.dmp