Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    02-06-2022 14:20

General

  • Target

    917479278d18fb239bb661f3960a821f.exe

  • Size

    265KB

  • MD5

    917479278d18fb239bb661f3960a821f

  • SHA1

    b85df90355ffd75a29855e4488e306433ee8e035

  • SHA256

    3bc7cbfbffcb2fe26936caceab37794a4c9b750d2afe9733d2885860d50727f1

  • SHA512

    c8eb6d79f58fb060d5c019bd73014297ae4fcb6cc3350a74f2bbc96e98d5cd049f3874b4c5d83950b02f9cb116caeaccb8499fc3c8c50a2f761803def2a24535

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:3032
    • C:\Users\Admin\AppData\Local\Temp\917479278d18fb239bb661f3960a821f.exe
      "C:\Users\Admin\AppData\Local\Temp\917479278d18fb239bb661f3960a821f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4436
      • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
        C:\Users\Admin\AppData\Local\Temp\rpaise.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2808
        • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
          C:\Users\Admin\AppData\Local\Temp\rpaise.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3616
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\SysWOW64\cmd.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:740
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\rpaise.exe"
              6⤵
                PID:3456
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:464
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:4272
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:436
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:3040
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:4736

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\hu8td9yzk1kjm3cl7lp7
                Filesize

                213KB

                MD5

                a7ad4dcb67d4f5facf795967950ddec7

                SHA1

                d72735bb705b7354ed79a95ecb1baaa77924fa93

                SHA256

                7c15718892bb00067d3cb79c931d2c08f046df203a4aa03a7c3cdda4677ed5e8

                SHA512

                046af78b65b3e7664765c0924ac79e8f03182e9c35c57b8983d084ce190b1ab34d00ed3727e9bed315b3c2ada3024140e00dac62387f77daf8cbb59d88af64bb

              • C:\Users\Admin\AppData\Local\Temp\rnwtjeb
                Filesize

                4KB

                MD5

                8495553dafb39c9feaa5470bf449e73c

                SHA1

                53841c44343d2bc66a96eb9236854551a568ed40

                SHA256

                92429ea9fc92c180bed86632e42354d4f10985bee092fac672898ec71b5eef00

                SHA512

                b4c1ce526bf63662fa6105292273062cee495c2a13874f712c666ce8114160ee96c2c2ce84aebebfc8d8fda1412201e2e617fdbf240a918d94c2b9140f1cafcb

              • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
                Filesize

                55KB

                MD5

                9c5faf3fe0cc6103f62962aac4ad642d

                SHA1

                a44ccc223163e125c527daab5ed3688303b2eb2e

                SHA256

                b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

                SHA512

                dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

              • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
                Filesize

                55KB

                MD5

                9c5faf3fe0cc6103f62962aac4ad642d

                SHA1

                a44ccc223163e125c527daab5ed3688303b2eb2e

                SHA256

                b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

                SHA512

                dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

              • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
                Filesize

                55KB

                MD5

                9c5faf3fe0cc6103f62962aac4ad642d

                SHA1

                a44ccc223163e125c527daab5ed3688303b2eb2e

                SHA256

                b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

                SHA512

                dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

              • memory/740-153-0x0000000001030000-0x0000000001059000-memory.dmp
                Filesize

                164KB

              • memory/740-149-0x00000000019A0000-0x0000000001CEA000-memory.dmp
                Filesize

                3.3MB

              • memory/740-151-0x0000000001730000-0x00000000017C0000-memory.dmp
                Filesize

                576KB

              • memory/740-148-0x0000000001030000-0x0000000001059000-memory.dmp
                Filesize

                164KB

              • memory/740-146-0x0000000000000000-mapping.dmp
              • memory/740-147-0x0000000000C10000-0x0000000000C6A000-memory.dmp
                Filesize

                360KB

              • memory/2808-130-0x0000000000000000-mapping.dmp
              • memory/3032-154-0x0000000008B40000-0x0000000008C34000-memory.dmp
                Filesize

                976KB

              • memory/3032-152-0x0000000008B40000-0x0000000008C34000-memory.dmp
                Filesize

                976KB

              • memory/3032-141-0x00000000085B0000-0x0000000008664000-memory.dmp
                Filesize

                720KB

              • memory/3032-144-0x0000000008A80000-0x0000000008B37000-memory.dmp
                Filesize

                732KB

              • memory/3456-150-0x0000000000000000-mapping.dmp
              • memory/3616-136-0x0000000000400000-0x0000000000429000-memory.dmp
                Filesize

                164KB

              • memory/3616-145-0x0000000000400000-0x0000000000429000-memory.dmp
                Filesize

                164KB

              • memory/3616-143-0x0000000000930000-0x0000000000941000-memory.dmp
                Filesize

                68KB

              • memory/3616-142-0x0000000000400000-0x0000000000429000-memory.dmp
                Filesize

                164KB

              • memory/3616-140-0x00000000006C0000-0x00000000006D1000-memory.dmp
                Filesize

                68KB

              • memory/3616-139-0x00000000009E0000-0x0000000000D2A000-memory.dmp
                Filesize

                3.3MB

              • memory/3616-135-0x0000000000000000-mapping.dmp