Analysis

  • max time kernel
    122s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    30-12-2023 14:25

General

  • Target

    1b58203ecd7ef5d31ea39a5218b40115.exe

  • Size

    490KB

  • MD5

    1b58203ecd7ef5d31ea39a5218b40115

  • SHA1

    2770e86784c8e3bc62f59a02c92390bd74b6dc98

  • SHA256

    f5e9658f44135be66cc2cb4862c67326c803871e49a73b0376b266cb95c41f52

  • SHA512

    1f5e3a616713cf8daa6778ab6a895ed488ac294bf677b967ff68dec9a8fd0a14c679f4e0d79131640566f95f27cbf0bebf9f5291f70b7cd26e405a05b296fe9e

  • SSDEEP

    12288:dtfEdMQEJJMkdBvd1Zy8OfGPAE9Zsi4hdStfDWc8Q2tZsi:dtsdoJuEBvd1g5fGPP9Zsf

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

k8b5

Decoy

sardamedicals.com

reelectkendavis4council.com

coreconsultation.com

fajarazhary.com

mybitearner.com

brightpet.info

voicewithchoice.com

bailbondscompany.xyz

7133333333.com

delights.info

gawlvegdr.icu

sdqhpm.com

we2savvyok.com

primallifeathlete.com

gdsinglecell.com

isokineticmachines.com

smartneckrelax.com

gardenvintage.com

hiphopvolume.com

medicapoint.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe
    "C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe
      "C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"
      2⤵
        PID:2648
      • C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe
        "C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1616

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1616-8-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1616-16-0x00000000009C0000-0x0000000000CC3000-memory.dmp

      Filesize

      3.0MB

    • memory/1616-14-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1616-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1616-10-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2440-3-0x0000000001DB0000-0x0000000001DCC000-memory.dmp

      Filesize

      112KB

    • memory/2440-6-0x0000000007460000-0x00000000074C8000-memory.dmp

      Filesize

      416KB

    • memory/2440-7-0x0000000000550000-0x0000000000586000-memory.dmp

      Filesize

      216KB

    • memory/2440-5-0x00000000049C0000-0x0000000004A00000-memory.dmp

      Filesize

      256KB

    • memory/2440-4-0x0000000073E50000-0x000000007453E000-memory.dmp

      Filesize

      6.9MB

    • memory/2440-0-0x0000000000360000-0x00000000003E0000-memory.dmp

      Filesize

      512KB

    • memory/2440-2-0x00000000049C0000-0x0000000004A00000-memory.dmp

      Filesize

      256KB

    • memory/2440-15-0x0000000073E50000-0x000000007453E000-memory.dmp

      Filesize

      6.9MB

    • memory/2440-1-0x0000000073E50000-0x000000007453E000-memory.dmp

      Filesize

      6.9MB