Analysis

  • max time kernel
    187s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    03-06-2022 00:23

General

  • Target

    917479278d18fb239bb661f3960a821f.exe

  • Size

    265KB

  • MD5

    917479278d18fb239bb661f3960a821f

  • SHA1

    b85df90355ffd75a29855e4488e306433ee8e035

  • SHA256

    3bc7cbfbffcb2fe26936caceab37794a4c9b750d2afe9733d2885860d50727f1

  • SHA512

    c8eb6d79f58fb060d5c019bd73014297ae4fcb6cc3350a74f2bbc96e98d5cd049f3874b4c5d83950b02f9cb116caeaccb8499fc3c8c50a2f761803def2a24535

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\917479278d18fb239bb661f3960a821f.exe
    "C:\Users\Admin\AppData\Local\Temp\917479278d18fb239bb661f3960a821f.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1476
    • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
      C:\Users\Admin\AppData\Local\Temp\rpaise.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1608
      • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
        C:\Users\Admin\AppData\Local\Temp\rpaise.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1732
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:908
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\rpaise.exe"
        3⤵
          PID:864

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\hu8td9yzk1kjm3cl7lp7
      Filesize

      213KB

      MD5

      a7ad4dcb67d4f5facf795967950ddec7

      SHA1

      d72735bb705b7354ed79a95ecb1baaa77924fa93

      SHA256

      7c15718892bb00067d3cb79c931d2c08f046df203a4aa03a7c3cdda4677ed5e8

      SHA512

      046af78b65b3e7664765c0924ac79e8f03182e9c35c57b8983d084ce190b1ab34d00ed3727e9bed315b3c2ada3024140e00dac62387f77daf8cbb59d88af64bb

    • C:\Users\Admin\AppData\Local\Temp\rnwtjeb
      Filesize

      4KB

      MD5

      8495553dafb39c9feaa5470bf449e73c

      SHA1

      53841c44343d2bc66a96eb9236854551a568ed40

      SHA256

      92429ea9fc92c180bed86632e42354d4f10985bee092fac672898ec71b5eef00

      SHA512

      b4c1ce526bf63662fa6105292273062cee495c2a13874f712c666ce8114160ee96c2c2ce84aebebfc8d8fda1412201e2e617fdbf240a918d94c2b9140f1cafcb

    • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
      Filesize

      55KB

      MD5

      9c5faf3fe0cc6103f62962aac4ad642d

      SHA1

      a44ccc223163e125c527daab5ed3688303b2eb2e

      SHA256

      b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

      SHA512

      dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

    • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
      Filesize

      55KB

      MD5

      9c5faf3fe0cc6103f62962aac4ad642d

      SHA1

      a44ccc223163e125c527daab5ed3688303b2eb2e

      SHA256

      b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

      SHA512

      dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

    • C:\Users\Admin\AppData\Local\Temp\rpaise.exe
      Filesize

      55KB

      MD5

      9c5faf3fe0cc6103f62962aac4ad642d

      SHA1

      a44ccc223163e125c527daab5ed3688303b2eb2e

      SHA256

      b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

      SHA512

      dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

    • \Users\Admin\AppData\Local\Temp\rpaise.exe
      Filesize

      55KB

      MD5

      9c5faf3fe0cc6103f62962aac4ad642d

      SHA1

      a44ccc223163e125c527daab5ed3688303b2eb2e

      SHA256

      b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

      SHA512

      dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

    • \Users\Admin\AppData\Local\Temp\rpaise.exe
      Filesize

      55KB

      MD5

      9c5faf3fe0cc6103f62962aac4ad642d

      SHA1

      a44ccc223163e125c527daab5ed3688303b2eb2e

      SHA256

      b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

      SHA512

      dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

    • \Users\Admin\AppData\Local\Temp\rpaise.exe
      Filesize

      55KB

      MD5

      9c5faf3fe0cc6103f62962aac4ad642d

      SHA1

      a44ccc223163e125c527daab5ed3688303b2eb2e

      SHA256

      b6e3cae967e17270bf9eaaa7f5f74824a0130329bc6fed950dfe0973dd3df192

      SHA512

      dc8f6e30aedc0608dc522b6e720850b408615e498c562261c9b9a888ee22c644d757258215722a6a3beadb4653940b4ff134930bf2a7349ada937b9b042d9f12

    • memory/864-73-0x0000000000000000-mapping.dmp
    • memory/908-74-0x0000000000EA0000-0x0000000000FA4000-memory.dmp
      Filesize

      1.0MB

    • memory/908-75-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/908-79-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/908-77-0x0000000000960000-0x00000000009F0000-memory.dmp
      Filesize

      576KB

    • memory/908-76-0x00000000023B0000-0x00000000026B3000-memory.dmp
      Filesize

      3.0MB

    • memory/908-71-0x0000000000000000-mapping.dmp
    • memory/1404-70-0x0000000004DD0000-0x0000000004EFF000-memory.dmp
      Filesize

      1.2MB

    • memory/1404-78-0x0000000004890000-0x000000000498F000-memory.dmp
      Filesize

      1020KB

    • memory/1404-80-0x0000000004890000-0x000000000498F000-memory.dmp
      Filesize

      1020KB

    • memory/1476-54-0x0000000075721000-0x0000000075723000-memory.dmp
      Filesize

      8KB

    • memory/1608-57-0x0000000000000000-mapping.dmp
    • memory/1732-69-0x0000000000460000-0x0000000000471000-memory.dmp
      Filesize

      68KB

    • memory/1732-64-0x000000000041D540-mapping.dmp
    • memory/1732-68-0x00000000008B0000-0x0000000000BB3000-memory.dmp
      Filesize

      3.0MB

    • memory/1732-67-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1732-63-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB