Analysis

  • max time kernel
    149s
  • max time network
    182s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-06-2022 11:25

General

  • Target

    soa.exe

  • Size

    733KB

  • MD5

    430cb910503e0fb17dea4259ad82e0c9

  • SHA1

    2a6d2f9521ff771c5320719f7142ddec7163e2b7

  • SHA256

    29e01694dfdb882f3922844f2fa640eb19fb99ff1179ac378df15b45fac32f11

  • SHA512

    1cb05ab896d6f2ca211d25242fdf515ce7399e53bd09e697f621a6bc911a0ac098e9bfe3d5cbb623629e3ca10d5474d429bc8c07ab2a07d02f6c1fa9ea2dd288

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

a8hq

Decoy

veteransductcleaning.com

beajtjunkies.com

houseofascofi.com

scottsdalemediator.com

atelyadesign.com

profitcase.pro

imtokenio.club

qinglingpai.com

bigsmile-meal.net

daytonlivestream.com

aspiradores10.online

ytybs120.com

hdatelier.com

bearpierce.com

yeson28ca.com

booklearner.com

m8j9.club

mmophamthinhlegend.space

hq4a7o6zb.com

sophiadaki.online

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3180
    • C:\Users\Admin\AppData\Local\Temp\soa.exe
      "C:\Users\Admin\AppData\Local\Temp\soa.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:936
      • C:\Users\Admin\AppData\Local\Temp\soa.exe
        "{path}"
        3⤵
          PID:4460
        • C:\Users\Admin\AppData\Local\Temp\soa.exe
          "{path}"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4520
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:2132
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:1412
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:532
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:448
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:1700
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:4540
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:3428
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:360
                      • C:\Windows\SysWOW64\control.exe
                        "C:\Windows\SysWOW64\control.exe"
                        2⤵
                        • Suspicious use of SetThreadContext
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3408
                        • C:\Windows\SysWOW64\cmd.exe
                          /c del "C:\Users\Admin\AppData\Local\Temp\soa.exe"
                          3⤵
                            PID:3416

                      Network

                      MITRE ATT&CK Matrix

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/936-131-0x0000000005E50000-0x00000000063F4000-memory.dmp
                        Filesize

                        5.6MB

                      • memory/936-132-0x0000000005760000-0x00000000057F2000-memory.dmp
                        Filesize

                        584KB

                      • memory/936-133-0x00000000058A0000-0x000000000593C000-memory.dmp
                        Filesize

                        624KB

                      • memory/936-134-0x0000000003180000-0x000000000318A000-memory.dmp
                        Filesize

                        40KB

                      • memory/936-130-0x0000000000DC0000-0x0000000000E7C000-memory.dmp
                        Filesize

                        752KB

                      • memory/3180-141-0x0000000008C90000-0x0000000008DA8000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/3180-151-0x0000000008B10000-0x0000000008BD8000-memory.dmp
                        Filesize

                        800KB

                      • memory/3180-150-0x0000000008B10000-0x0000000008BD8000-memory.dmp
                        Filesize

                        800KB

                      • memory/3408-146-0x0000000000350000-0x000000000037B000-memory.dmp
                        Filesize

                        172KB

                      • memory/3408-142-0x0000000000000000-mapping.dmp
                      • memory/3408-144-0x0000000000E70000-0x0000000000E97000-memory.dmp
                        Filesize

                        156KB

                      • memory/3408-145-0x0000000002460000-0x00000000027AA000-memory.dmp
                        Filesize

                        3.3MB

                      • memory/3408-148-0x0000000000350000-0x000000000037B000-memory.dmp
                        Filesize

                        172KB

                      • memory/3408-149-0x0000000002370000-0x0000000002400000-memory.dmp
                        Filesize

                        576KB

                      • memory/3416-147-0x0000000000000000-mapping.dmp
                      • memory/4460-135-0x0000000000000000-mapping.dmp
                      • memory/4520-140-0x0000000001160000-0x0000000001171000-memory.dmp
                        Filesize

                        68KB

                      • memory/4520-139-0x0000000001620000-0x000000000196A000-memory.dmp
                        Filesize

                        3.3MB

                      • memory/4520-143-0x0000000000400000-0x000000000042B000-memory.dmp
                        Filesize

                        172KB

                      • memory/4520-137-0x0000000000400000-0x000000000042B000-memory.dmp
                        Filesize

                        172KB

                      • memory/4520-136-0x0000000000000000-mapping.dmp