Analysis

  • max time kernel
    157s
  • max time network
    175s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-01-2023 19:38

General

  • Target

    ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe

  • Size

    2.4MB

  • MD5

    402094b5077f7c94530f78882e1a9def

  • SHA1

    d0d7ac67bba3022b3649d8766402a3f67d84e688

  • SHA256

    ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb

  • SHA512

    7a0204b584706c44edfb031f7713b5589ffa0d4c681355a287920e7758c0b1cfdad2ba7abfaa6f7b928aa7193f04564a6818b9052535ba53ee25076f42ca3075

  • SSDEEP

    49152:RqoZ0ajbQzlK5O+l4QOnn8jeX+l8uvlhfNf5lWLPNyeL9+hw/USGy7Xk/51HwgGF:5X0zli6u4985m0sQ1a7

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

ivay

Decoy

b4ukid.com

missioncontrol2030.com

chriswhitefoto.com

guepard-marine.com

getlauded.com

jingdonglm.com

clintlove.com

boldstrategicmedia.com

bluebay3dwdmall.com

aishag.com

forexexpoaward.com

basslakedisposal.com

bukannyaterbuai36.com

learntrhc.com

cancunpolo.com

case-cornershop.com

tahiticomplementos.com

dashanzhf.com

wholeholistichealth.com

inass-yassin.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe
    "C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2572
    • C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe
      "C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe"
      2⤵
        PID:4708
      • C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe
        "C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe"
        2⤵
          PID:4832
        • C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe
          "C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe"
          2⤵
            PID:4776
          • C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe
            "C:\Users\Admin\AppData\Local\Temp\ba80a5efff5dcb59efb1cd4fd12ac508b6e1fb9774d119893fb721b2d1d8f8cb.exe"
            2⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:4384
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 1160
            2⤵
            • Program crash
            PID:4984
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2572 -ip 2572
          1⤵
            PID:4720

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2572-132-0x0000000000170000-0x00000000003E8000-memory.dmp
            Filesize

            2.5MB

          • memory/2572-133-0x0000000005460000-0x0000000005A04000-memory.dmp
            Filesize

            5.6MB

          • memory/2572-134-0x0000000005300000-0x0000000005392000-memory.dmp
            Filesize

            584KB

          • memory/2572-135-0x0000000005A10000-0x0000000005AAC000-memory.dmp
            Filesize

            624KB

          • memory/4384-139-0x0000000000000000-mapping.dmp
          • memory/4384-140-0x0000000000400000-0x0000000000429000-memory.dmp
            Filesize

            164KB

          • memory/4384-141-0x0000000001AA0000-0x0000000001DEA000-memory.dmp
            Filesize

            3.3MB

          • memory/4708-136-0x0000000000000000-mapping.dmp
          • memory/4776-138-0x0000000000000000-mapping.dmp
          • memory/4832-137-0x0000000000000000-mapping.dmp