Analysis

  • max time kernel
    101s
  • max time network
    125s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    31-05-2022 11:46

General

  • Target

    SecuriteInfo.com.W32.AIDetectNet.01.8006.exe

  • Size

    1.4MB

  • MD5

    57138eb4381bfad492ff92f212cb26a6

  • SHA1

    8f579ae5f1809587bb91a01a43288e827f542afc

  • SHA256

    174f8ae3d2b924f845a9d1708dbb9dc3e219b21252b14cdcf8c253f2900c7d4f

  • SHA512

    10157223dff8f08946f14832e70b31d30954417278c91e7c4d7f57e1a7c4599573a51fe25b747ab5571fe56dec04d30c1b07fcc79466aa28512c377ba6253805

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

a8hq

Decoy

veteransductcleaning.com

beajtjunkies.com

houseofascofi.com

scottsdalemediator.com

atelyadesign.com

profitcase.pro

imtokenio.club

qinglingpai.com

bigsmile-meal.net

daytonlivestream.com

aspiradores10.online

ytybs120.com

hdatelier.com

bearpierce.com

yeson28ca.com

booklearner.com

m8j9.club

mmophamthinhlegend.space

hq4a7o6zb.com

sophiadaki.online

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.8006.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.8006.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4788
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.W32.AIDetectNet.01.8006.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4564

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4564-135-0x0000000000000000-mapping.dmp
  • memory/4564-136-0x0000000000400000-0x000000000042B000-memory.dmp
    Filesize

    172KB

  • memory/4564-137-0x00000000018D0000-0x0000000001C1A000-memory.dmp
    Filesize

    3.3MB

  • memory/4788-130-0x0000000000ED0000-0x000000000103C000-memory.dmp
    Filesize

    1.4MB

  • memory/4788-131-0x0000000005F40000-0x00000000064E4000-memory.dmp
    Filesize

    5.6MB

  • memory/4788-132-0x0000000005890000-0x0000000005922000-memory.dmp
    Filesize

    584KB

  • memory/4788-133-0x0000000005A30000-0x0000000005ACC000-memory.dmp
    Filesize

    624KB

  • memory/4788-134-0x0000000005930000-0x000000000593A000-memory.dmp
    Filesize

    40KB