Analysis

  • max time kernel
    118s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30/12/2023, 07:19

General

  • Target

    11f3b98b2126362766db354da379662e.exe

  • Size

    231KB

  • MD5

    11f3b98b2126362766db354da379662e

  • SHA1

    54da8ed5af07efed41e1faf4a870242dbf48c4f8

  • SHA256

    dcfe7b2bec62bcc80e54c023bddc64a865538e113b39102f116d84b9019963a4

  • SHA512

    2fe8dfd6965067fb660042e652718b7de27b902ca5fd7edfbba20326420e9a2a7c8ace4202ec00161c70351795fbe32b96807327bdee9c3d0e86d10616553ffb

  • SSDEEP

    6144:TAdKgsvy9iF8IAgzWVpRv45rcWYvpw64QbdzUAbsgrE6tB6:eKbvSGzWjBNv264QbdzZbsgrE6tB6

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

u8aa

Decoy

quantexchanges.com

hizliarac.com

dropsdementanovohamburgo.com

tcinsurancegroup.net

byobvendors.com

arteasba.com

azrealtorsmastermind.com

voiceof5aabtv.com

zoom-bloopers.com

jxsenmei.com

interia-poczta.email

coolgiftbaskets.net

magetu.info

weedliberal.com

drsergiocastilloangiologo.com

starinsiderau.com

weightneutralmetflex.com

youxiandian.com

liberation.media

ferrari-news.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe
    "C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    PID:2296
  • C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe
    "C:\Users\Admin\AppData\Local\Temp\11f3b98b2126362766db354da379662e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2672

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2296-5-0x0000000000910000-0x0000000000C13000-memory.dmp

    Filesize

    3.0MB

  • memory/2296-1-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2296-6-0x0000000000910000-0x0000000000C13000-memory.dmp

    Filesize

    3.0MB

  • memory/2672-0-0x0000000000400000-0x000000000040B000-memory.dmp

    Filesize

    44KB

  • memory/2672-2-0x0000000000280000-0x0000000000282000-memory.dmp

    Filesize

    8KB