Analysis

  • max time kernel
    122s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29-12-2023 22:29

General

  • Target

    05a0edfd781368d1b62b066b5aadb278.exe

  • Size

    967KB

  • MD5

    05a0edfd781368d1b62b066b5aadb278

  • SHA1

    cfd9740076f345776543d874d0705571618601c0

  • SHA256

    bae8e6518524a6945339b3a0901e9ad43c03441000b239d777bf60e58eed6324

  • SHA512

    5e2152bdbac47a23cc3d6c524a3c1fd897c51a28a5c17986af8b6679570c8a7b4f38b374836464f72eda59f8bbef873c46bed51bd21b77d974b0cc1f6c8b8610

  • SSDEEP

    12288:EN+rQEDaNyW91w1P+fRyEOzM8KX8MYD7uwgGEtZ182+j4h:dr5DaNyW91wd+fRvOzpKzSywO182Vh

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

k8b5

Decoy

sardamedicals.com

reelectkendavis4council.com

coreconsultation.com

fajarazhary.com

mybitearner.com

brightpet.info

voicewithchoice.com

bailbondscompany.xyz

7133333333.com

delights.info

gawlvegdr.icu

sdqhpm.com

we2savvyok.com

primallifeathlete.com

gdsinglecell.com

isokineticmachines.com

smartneckrelax.com

gardenvintage.com

hiphopvolume.com

medicapoint.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05a0edfd781368d1b62b066b5aadb278.exe
    "C:\Users\Admin\AppData\Local\Temp\05a0edfd781368d1b62b066b5aadb278.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2360
    • C:\Users\Admin\AppData\Local\Temp\05a0edfd781368d1b62b066b5aadb278.exe
      "C:\Users\Admin\AppData\Local\Temp\05a0edfd781368d1b62b066b5aadb278.exe"
      2⤵
        PID:2608
      • C:\Users\Admin\AppData\Local\Temp\05a0edfd781368d1b62b066b5aadb278.exe
        "C:\Users\Admin\AppData\Local\Temp\05a0edfd781368d1b62b066b5aadb278.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2640

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2360-6-0x0000000005060000-0x00000000050E8000-memory.dmp
      Filesize

      544KB

    • memory/2360-1-0x0000000074B50000-0x000000007523E000-memory.dmp
      Filesize

      6.9MB

    • memory/2360-2-0x0000000004EE0000-0x0000000004F20000-memory.dmp
      Filesize

      256KB

    • memory/2360-3-0x0000000000620000-0x000000000063C000-memory.dmp
      Filesize

      112KB

    • memory/2360-4-0x0000000074B50000-0x000000007523E000-memory.dmp
      Filesize

      6.9MB

    • memory/2360-5-0x0000000004EE0000-0x0000000004F20000-memory.dmp
      Filesize

      256KB

    • memory/2360-0-0x0000000001080000-0x0000000001178000-memory.dmp
      Filesize

      992KB

    • memory/2360-7-0x0000000000B40000-0x0000000000B92000-memory.dmp
      Filesize

      328KB

    • memory/2360-15-0x0000000074B50000-0x000000007523E000-memory.dmp
      Filesize

      6.9MB

    • memory/2640-10-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2640-8-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2640-14-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2640-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
      Filesize

      4KB

    • memory/2640-16-0x0000000000AC0000-0x0000000000DC3000-memory.dmp
      Filesize

      3.0MB