Analysis

  • max time kernel
    153s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/12/2023, 22:38

General

  • Target

    fd45ab42cffc17209261bff2430c8245.exe

  • Size

    821KB

  • MD5

    fd45ab42cffc17209261bff2430c8245

  • SHA1

    d06143966b8ca02db582f5111fc275844796786f

  • SHA256

    6afa5e287f69f392b8481a94ebb1729c606a1f1023820e79e942ad40dfe96859

  • SHA512

    c6326b0d3f029bfe7b9d2cee32b89dee3b46b921af5f342958971d5c5be4e2be6fd9d3ca518b5215f6f0a3572d4f739922f1f7392c67acd1967c42d99145252f

  • SSDEEP

    12288:vMrP7wwt12QLaX3miWy4hTniOHDA4HnIsNGEG9gfy27ONd+5nDCZ+ug3vI4SeZ91:ErP7ww4V4h2wChgfVu8q7mo5oFCEkv

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

m6b5

Decoy

ixtarbelize.com

pheamal.com

daiyncc.com

staydoubted.com

laagerlitigation.club

sukrantastansakarya.com

esupport.ltd

vetscontracting.net

themuslimlife.coach

salmanairs.com

somatictherapyservices.com

lastminuteminister.com

comunicarbuenosaires.com

kazuya.tech

insightlyservicedev.com

redevelopment38subhashnagar.com

thefutureinvestor.com

simplysu.com

lagu45.com

livingstonpistolpermit.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Users\Admin\AppData\Local\Temp\fd45ab42cffc17209261bff2430c8245.exe
      "C:\Users\Admin\AppData\Local\Temp\fd45ab42cffc17209261bff2430c8245.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3952
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1312
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3720
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:632

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1312-19-0x0000000001450000-0x0000000001460000-memory.dmp

      Filesize

      64KB

    • memory/1312-16-0x00000000018C0000-0x0000000001C0A000-memory.dmp

      Filesize

      3.3MB

    • memory/1312-13-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1312-18-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3492-20-0x0000000002D50000-0x0000000002E0E000-memory.dmp

      Filesize

      760KB

    • memory/3492-35-0x0000000007F70000-0x000000000807E000-memory.dmp

      Filesize

      1.1MB

    • memory/3492-32-0x0000000007F70000-0x000000000807E000-memory.dmp

      Filesize

      1.1MB

    • memory/3492-31-0x0000000007F70000-0x000000000807E000-memory.dmp

      Filesize

      1.1MB

    • memory/3492-28-0x0000000002D50000-0x0000000002E0E000-memory.dmp

      Filesize

      760KB

    • memory/3720-25-0x0000000000E00000-0x0000000000E29000-memory.dmp

      Filesize

      164KB

    • memory/3720-21-0x00000000000A0000-0x00000000000AB000-memory.dmp

      Filesize

      44KB

    • memory/3720-22-0x00000000000A0000-0x00000000000AB000-memory.dmp

      Filesize

      44KB

    • memory/3720-23-0x0000000000E00000-0x0000000000E29000-memory.dmp

      Filesize

      164KB

    • memory/3720-24-0x00000000014E0000-0x000000000182A000-memory.dmp

      Filesize

      3.3MB

    • memory/3720-27-0x00000000013B0000-0x000000000143F000-memory.dmp

      Filesize

      572KB

    • memory/3952-7-0x00000000051A0000-0x00000000051F6000-memory.dmp

      Filesize

      344KB

    • memory/3952-15-0x0000000075060000-0x0000000075810000-memory.dmp

      Filesize

      7.7MB

    • memory/3952-12-0x00000000054D0000-0x0000000005504000-memory.dmp

      Filesize

      208KB

    • memory/3952-11-0x0000000007A50000-0x0000000007ACC000-memory.dmp

      Filesize

      496KB

    • memory/3952-10-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/3952-9-0x0000000075060000-0x0000000075810000-memory.dmp

      Filesize

      7.7MB

    • memory/3952-8-0x0000000002870000-0x0000000002882000-memory.dmp

      Filesize

      72KB

    • memory/3952-1-0x0000000075060000-0x0000000075810000-memory.dmp

      Filesize

      7.7MB

    • memory/3952-6-0x0000000004FB0000-0x0000000004FBA000-memory.dmp

      Filesize

      40KB

    • memory/3952-5-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/3952-4-0x00000000050A0000-0x0000000005132000-memory.dmp

      Filesize

      584KB

    • memory/3952-3-0x0000000005650000-0x0000000005BF4000-memory.dmp

      Filesize

      5.6MB

    • memory/3952-2-0x0000000005000000-0x000000000509C000-memory.dmp

      Filesize

      624KB

    • memory/3952-0-0x00000000004E0000-0x00000000005B4000-memory.dmp

      Filesize

      848KB