Analysis

  • max time kernel
    46s
  • max time network
    49s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    01-02-2023 05:12

General

  • Target

    03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe

  • Size

    297KB

  • MD5

    1389a18fcec0387decef3285f554284c

  • SHA1

    03d9cbee9522c2c8a267b7e9599a9d245c35c7ac

  • SHA256

    b4e90d54cb2c30b79086c1b143ecaa786a8e3866478c8d02755a5af2522f6337

  • SHA512

    836a3447d3b9f76060fc8a3bab4491cb7ac01a70eaac0636e1726bbb444fde7ec9af8e4d0bef9dd395b0af30cd3ff6bfe4a6473a7c37b82f2bf1650db7043ab9

  • SSDEEP

    6144:aDEMO1jp2qn9FrB/WOUh97Zl9T0cP1jRLTxpeRq0mRAHN61Z:wElDXn9FLUPBT0cNZYFmRWwZ

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

hxyz

Decoy

rocketfail.info

myktbw.com

weednbooze.com

payme-checkout.com

mrt2022.com

uokyasti.icu

hoteldesilvapiaseczno.com

hcdongli.net

8usd.com

africasupplychainthinktank.com

50by250.net

thelsdesign.com

lauraapine.com

albrightonhouse.com

m-arad-attorney.com

wongtangstore8.host

davisandstine.com

catcatwoman9camcomto.photos

jumpstarbungee.com

complexx-industries.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe
    "C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1680
    • C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe
      "C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1992

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1992-54-0x000000000041D080-mapping.dmp
  • memory/1992-55-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/1992-56-0x0000000000AF0000-0x0000000000DF3000-memory.dmp
    Filesize

    3.0MB