Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    14-05-2022 13:28

General

  • Target

    ce42fe431b88922ab59b6fd880cadcf6.exe

  • Size

    224KB

  • MD5

    ce42fe431b88922ab59b6fd880cadcf6

  • SHA1

    652914d960da1d37d270db7f6e3b07c9d4b0e3a9

  • SHA256

    4d8cc87942499042195cec4fdb2fc5869d4bf98a1d827fd30fb74e82cf0fdc0f

  • SHA512

    62b30a77cb2ef3491abb3ec517ca966c4a9eafa0f263118ba817a4ce87f8d3cddc014bce25ff268435b7f69605e6c14b8031b482f7caf00e855964c618c609ba

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ocgr

Decoy

shiftmedicalstaffing.agency

muktobangla.xyz

attmleather.com

modelahs.com

clime.email

yonatec.com

mftie.com

doxofcolor.com

american-atlantic.net

christineenergy.com

fjqsdz.com

nagpurmandarin.com

hofwimmer.com

gororidev.com

china-eros.com

xn--ekrt15fxyb2t2c.xn--czru2d

dabsavy.com

buggy4t.com

souplant.com

insurancewineappraisals.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\ce42fe431b88922ab59b6fd880cadcf6.exe
      "C:\Users\Admin\AppData\Local\Temp\ce42fe431b88922ab59b6fd880cadcf6.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1848
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4272
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:3960
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:3764
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:3836
          • C:\Windows\SysWOW64\WWAHost.exe
            "C:\Windows\SysWOW64\WWAHost.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2936
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
              3⤵
                PID:1228

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1228-139-0x0000000000000000-mapping.dmp

          • memory/1848-131-0x00000000053F0000-0x000000000548C000-memory.dmp

            Filesize

            624KB

          • memory/1848-130-0x0000000000940000-0x000000000097E000-memory.dmp

            Filesize

            248KB

          • memory/2936-143-0x00000000011E0000-0x0000000001270000-memory.dmp

            Filesize

            576KB

          • memory/2936-142-0x00000000013C0000-0x000000000170A000-memory.dmp

            Filesize

            3.3MB

          • memory/2936-141-0x00000000004F0000-0x0000000000519000-memory.dmp

            Filesize

            164KB

          • memory/2936-140-0x0000000000350000-0x000000000042C000-memory.dmp

            Filesize

            880KB

          • memory/2936-138-0x0000000000000000-mapping.dmp

          • memory/2996-137-0x0000000002BE0000-0x0000000002C9D000-memory.dmp

            Filesize

            756KB

          • memory/2996-144-0x0000000007BC0000-0x0000000007C54000-memory.dmp

            Filesize

            592KB

          • memory/4272-136-0x00000000016C0000-0x00000000016D1000-memory.dmp

            Filesize

            68KB

          • memory/4272-135-0x0000000001270000-0x00000000015BA000-memory.dmp

            Filesize

            3.3MB

          • memory/4272-133-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4272-132-0x0000000000000000-mapping.dmp