Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2022 19:52

General

  • Target

    tmp.exe

  • Size

    612KB

  • MD5

    0229fa24ef686c20e6d50c5a75aa8c27

  • SHA1

    07c4fa01089a3275f88ce4d7fa404040ac638c35

  • SHA256

    9696d3ec13f85ada39b140ae0096e765db0ff630f351ffa1e96484f6a4f2f030

  • SHA512

    bae11a5fa3b52c577f815dbda2aefca1a16475fd694cd62684dd31b6890731f14f1d1a3d147f5a159907b4e7e7dcc2cf5dff80b96a5e2076aa4c5cf7c2b56ca3

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

iewb

Decoy

n8FLlgIlb1rSEg5hJ9xMbw4hcmR38Q==

5vIAIY+pt81OtWs+FdIEdk7Y

LHIKc+oWGIQUUlfAAtEEdk7Y

ePM/cX2jvHrS

5hvPEw22+fdvmJz3C8FIVq0=

mb9EeX2jvHrS

Dx2zIYNvfjo8VUo5

6jVPnyJekv2RAc4gLKNwEqQ=

KWatHyjdE5Gj1Ng=

t9lk70gzUAZty4qjbVjF

6eUBeFPzKBWT125BFNIEdk7Y

dZUXOIyqTJGj1Ng=

iL3TVh2Jl5QVStnzxcAhIL8=

J1prtyklUfZGR/xDD71IbkWRd2yx

s9FgCOBRW9bU0Y6jbVjF

RYCbQDzcFBhcylgu

Fl0BV/8RJm6F9QRg8LXXTLo=

0dhumHzrCCZ3wdQg7nFF1AlL6Tk=

xvL+iL6wwX+/wH9K4lbZ/A==

N0lVceIFD5Gj1Ng=

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader payload 5 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1252
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:848
        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1608
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:2016
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:2008
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:1944
            • C:\Windows\SysWOW64\cmstp.exe
              "C:\Windows\SysWOW64\cmstp.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1272
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
                3⤵
                • Deletes itself
                PID:588

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/588-72-0x0000000000000000-mapping.dmp
          • memory/1184-68-0x00000000069F0000-0x0000000006B8B000-memory.dmp
            Filesize

            1.6MB

          • memory/1184-79-0x0000000004E40000-0x0000000004F22000-memory.dmp
            Filesize

            904KB

          • memory/1184-77-0x0000000004E40000-0x0000000004F22000-memory.dmp
            Filesize

            904KB

          • memory/1252-59-0x0000000004EA0000-0x0000000004ED2000-memory.dmp
            Filesize

            200KB

          • memory/1252-58-0x0000000005AE0000-0x0000000005B56000-memory.dmp
            Filesize

            472KB

          • memory/1252-55-0x00000000753E1000-0x00000000753E3000-memory.dmp
            Filesize

            8KB

          • memory/1252-56-0x00000000003C0000-0x00000000003E0000-memory.dmp
            Filesize

            128KB

          • memory/1252-54-0x00000000001B0000-0x000000000024E000-memory.dmp
            Filesize

            632KB

          • memory/1252-57-0x0000000000560000-0x000000000056E000-memory.dmp
            Filesize

            56KB

          • memory/1272-74-0x00000000000E0000-0x000000000010C000-memory.dmp
            Filesize

            176KB

          • memory/1272-69-0x0000000000000000-mapping.dmp
          • memory/1272-73-0x00000000003F0000-0x0000000000408000-memory.dmp
            Filesize

            96KB

          • memory/1272-75-0x0000000001F20000-0x0000000002223000-memory.dmp
            Filesize

            3.0MB

          • memory/1272-76-0x0000000001E20000-0x0000000001EB0000-memory.dmp
            Filesize

            576KB

          • memory/1272-78-0x00000000000E0000-0x000000000010C000-memory.dmp
            Filesize

            176KB

          • memory/1608-67-0x0000000000180000-0x0000000000191000-memory.dmp
            Filesize

            68KB

          • memory/1608-66-0x0000000000AA0000-0x0000000000DA3000-memory.dmp
            Filesize

            3.0MB

          • memory/1608-70-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1608-64-0x000000000041F840-mapping.dmp
          • memory/1608-63-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1608-61-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB

          • memory/1608-60-0x0000000000400000-0x000000000042C000-memory.dmp
            Filesize

            176KB