Analysis

  • max time kernel
    90s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    05-07-2022 17:55

General

  • Target

    985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe

  • Size

    837KB

  • MD5

    328eaa1e53fdeba2a8d99f4a5f0385dd

  • SHA1

    9da77711434bfe5eb4f26365513c7663da5e9885

  • SHA256

    985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc

  • SHA512

    475be1e25abb8697952b5014ebfa6d5e26eb3f0d312739771f4f0f91819f55b3620dbeb76c3bb47a7febf17f8588232d4cecb25cc130f7437d1d810dd8b0586d

Score
10/10

Malware Config

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe
    "C:\Users\Admin\AppData\Local\Temp\985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4416
    • C:\Users\Admin\AppData\Local\Temp\985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe
      "C:\Users\Admin\AppData\Local\Temp\985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe"
      2⤵
        PID:1340
      • C:\Users\Admin\AppData\Local\Temp\985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe
        "C:\Users\Admin\AppData\Local\Temp\985bff9f5d8470baf0a3c5520eae6e8bb87a9761bd6c7ce41855c5c8cc0a58bc.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:5048

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1340-136-0x0000000000000000-mapping.dmp
    • memory/4416-130-0x00000000006E0000-0x00000000007B8000-memory.dmp
      Filesize

      864KB

    • memory/4416-131-0x0000000005730000-0x0000000005CD4000-memory.dmp
      Filesize

      5.6MB

    • memory/4416-132-0x0000000005180000-0x0000000005212000-memory.dmp
      Filesize

      584KB

    • memory/4416-133-0x0000000002C00000-0x0000000002C0A000-memory.dmp
      Filesize

      40KB

    • memory/4416-134-0x0000000008BC0000-0x0000000008C5C000-memory.dmp
      Filesize

      624KB

    • memory/4416-135-0x0000000008C60000-0x0000000008CC6000-memory.dmp
      Filesize

      408KB

    • memory/5048-137-0x0000000000000000-mapping.dmp
    • memory/5048-138-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/5048-139-0x0000000001190000-0x00000000014DA000-memory.dmp
      Filesize

      3.3MB