Analysis

  • max time kernel
    147s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    25-04-2023 09:57

General

  • Target

    f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe

  • Size

    352KB

  • MD5

    fc7eb63804088472b1cac1ac9fe5d16f

  • SHA1

    63205c7b5c84296478f1ad7d335aa06b8b7da536

  • SHA256

    f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a

  • SHA512

    57c0dcf7689e04e172d4adfdd6295618cb5695034739a4c57d0fd871b864345e54dd05ed5c3475579ff742c947202618c59db0ea351f52521e1cf7622f007734

  • SSDEEP

    6144:UwxU76BJzteu9g8LJId0ER61it8LeZf5sm22UPLwkkBPPmK4vQniV:JU74eYg8ddER6C8LCKJ6PPmJvQiV

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

d6cd

Decoy

fatmerlion.com

gpo777.com

pacpointfg.com

s3k9r3de.com

jakitrade.com

tmsweets.biz

goodfoodsme.com

teddydefi.com

banahinvestments.com

kuvinziarno.quest

gma-bea10.com

onepotato.xyz

olympusconstructioncompany.com

amvids.info

tmc.wiki

swiftlybliss.com

provopreserve.com

rsvprose.com

staffremotely.com

diversifiedcontractingla.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe
      "C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:324
      • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
        C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1996
        • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
          C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1736
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1416
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe"
              6⤵
                PID:368
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:1756
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:1764
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:1072

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Discovery

          System Information Discovery

          1
          T1082

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\krqtdytaag
            Filesize

            4KB

            MD5

            b2e7c8631c39f0df1e14be81e7482aaf

            SHA1

            886c520daf38b08b4d32f3f522375cca39ad2c0b

            SHA256

            eee2111c310af6f27fa8e5eb4a9378302bcd4a2a32397ca39119cd057158425f

            SHA512

            1e858289210242b9fd87991e56f4db7fd30f3888fca4e8d78e845f781cdfee3ef508304c09f5d59c656ae933e67f6b9471ea7459721698a4cbedd39d6b7a7e6c

          • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
            Filesize

            117KB

            MD5

            918b5b3ab8c29f68394eb7017a42aa85

            SHA1

            1a783f39a9ed81412bc018a0d54a116bf9de3277

            SHA256

            b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

            SHA512

            4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

          • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
            Filesize

            117KB

            MD5

            918b5b3ab8c29f68394eb7017a42aa85

            SHA1

            1a783f39a9ed81412bc018a0d54a116bf9de3277

            SHA256

            b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

            SHA512

            4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

          • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
            Filesize

            117KB

            MD5

            918b5b3ab8c29f68394eb7017a42aa85

            SHA1

            1a783f39a9ed81412bc018a0d54a116bf9de3277

            SHA256

            b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

            SHA512

            4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

          • C:\Users\Admin\AppData\Local\Temp\l3vfu7hizn2
            Filesize

            210KB

            MD5

            5250e815ed0a5fb4eb4f2c9675dfb7e8

            SHA1

            46a0b7ddfd941e667e1201dd511a22b9a981cd3d

            SHA256

            0439dbfaa3df7150e41a27bf65f511c3ebb4c1fbbf8b005983c51013b496bc0c

            SHA512

            e31ebda956be17a00e2632a1a10e25dc3070a5feda166354c8dec5accd52e10c353d22ec5447f87f489f24163cd17bbd26a9d50cd3ec48063409293341702cf9

          • \Users\Admin\AppData\Local\Temp\ktvrnf.exe
            Filesize

            117KB

            MD5

            918b5b3ab8c29f68394eb7017a42aa85

            SHA1

            1a783f39a9ed81412bc018a0d54a116bf9de3277

            SHA256

            b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

            SHA512

            4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

          • \Users\Admin\AppData\Local\Temp\ktvrnf.exe
            Filesize

            117KB

            MD5

            918b5b3ab8c29f68394eb7017a42aa85

            SHA1

            1a783f39a9ed81412bc018a0d54a116bf9de3277

            SHA256

            b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

            SHA512

            4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

          • memory/1360-89-0x0000000006C70000-0x0000000006DC7000-memory.dmp
            Filesize

            1.3MB

          • memory/1360-87-0x0000000006C70000-0x0000000006DC7000-memory.dmp
            Filesize

            1.3MB

          • memory/1360-85-0x0000000006C70000-0x0000000006DC7000-memory.dmp
            Filesize

            1.3MB

          • memory/1360-71-0x0000000006A10000-0x0000000006BB4000-memory.dmp
            Filesize

            1.6MB

          • memory/1360-75-0x00000000064A0000-0x00000000065C6000-memory.dmp
            Filesize

            1.1MB

          • memory/1360-73-0x00000000036E0000-0x00000000037E0000-memory.dmp
            Filesize

            1024KB

          • memory/1416-81-0x0000000000080000-0x00000000000A9000-memory.dmp
            Filesize

            164KB

          • memory/1416-78-0x00000000013A0000-0x00000000013BB000-memory.dmp
            Filesize

            108KB

          • memory/1416-80-0x00000000013A0000-0x00000000013BB000-memory.dmp
            Filesize

            108KB

          • memory/1416-82-0x0000000000B40000-0x0000000000E43000-memory.dmp
            Filesize

            3.0MB

          • memory/1416-83-0x0000000000080000-0x00000000000A9000-memory.dmp
            Filesize

            164KB

          • memory/1416-84-0x0000000000450000-0x00000000004E0000-memory.dmp
            Filesize

            576KB

          • memory/1736-74-0x0000000000390000-0x00000000003A1000-memory.dmp
            Filesize

            68KB

          • memory/1736-76-0x0000000000400000-0x0000000000429000-memory.dmp
            Filesize

            164KB

          • memory/1736-72-0x0000000000400000-0x0000000000429000-memory.dmp
            Filesize

            164KB

          • memory/1736-70-0x0000000000350000-0x0000000000361000-memory.dmp
            Filesize

            68KB

          • memory/1736-68-0x0000000000910000-0x0000000000C13000-memory.dmp
            Filesize

            3.0MB

          • memory/1736-65-0x0000000000400000-0x0000000000429000-memory.dmp
            Filesize

            164KB