Analysis

  • max time kernel
    91s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-02-2023 05:12

General

  • Target

    03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe

  • Size

    297KB

  • MD5

    1389a18fcec0387decef3285f554284c

  • SHA1

    03d9cbee9522c2c8a267b7e9599a9d245c35c7ac

  • SHA256

    b4e90d54cb2c30b79086c1b143ecaa786a8e3866478c8d02755a5af2522f6337

  • SHA512

    836a3447d3b9f76060fc8a3bab4491cb7ac01a70eaac0636e1726bbb444fde7ec9af8e4d0bef9dd395b0af30cd3ff6bfe4a6473a7c37b82f2bf1650db7043ab9

  • SSDEEP

    6144:aDEMO1jp2qn9FrB/WOUh97Zl9T0cP1jRLTxpeRq0mRAHN61Z:wElDXn9FLUPBT0cNZYFmRWwZ

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

hxyz

Decoy

rocketfail.info

myktbw.com

weednbooze.com

payme-checkout.com

mrt2022.com

uokyasti.icu

hoteldesilvapiaseczno.com

hcdongli.net

8usd.com

africasupplychainthinktank.com

50by250.net

thelsdesign.com

lauraapine.com

albrightonhouse.com

m-arad-attorney.com

wongtangstore8.host

davisandstine.com

catcatwoman9camcomto.photos

jumpstarbungee.com

complexx-industries.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe
    "C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:3544
    • C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe
      "C:\Users\Admin\AppData\Local\Temp\03d9cbee9522c2c8a267b7e9599a9d245c35c7ac.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4212

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/4212-132-0x0000000000000000-mapping.dmp
  • memory/4212-133-0x0000000001620000-0x000000000196A000-memory.dmp
    Filesize

    3.3MB

  • memory/4212-134-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB