Analysis

  • max time kernel
    148s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 14:25

General

  • Target

    1b58203ecd7ef5d31ea39a5218b40115.exe

  • Size

    490KB

  • MD5

    1b58203ecd7ef5d31ea39a5218b40115

  • SHA1

    2770e86784c8e3bc62f59a02c92390bd74b6dc98

  • SHA256

    f5e9658f44135be66cc2cb4862c67326c803871e49a73b0376b266cb95c41f52

  • SHA512

    1f5e3a616713cf8daa6778ab6a895ed488ac294bf677b967ff68dec9a8fd0a14c679f4e0d79131640566f95f27cbf0bebf9f5291f70b7cd26e405a05b296fe9e

  • SSDEEP

    12288:dtfEdMQEJJMkdBvd1Zy8OfGPAE9Zsi4hdStfDWc8Q2tZsi:dtsdoJuEBvd1g5fGPP9Zsf

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

k8b5

Decoy

sardamedicals.com

reelectkendavis4council.com

coreconsultation.com

fajarazhary.com

mybitearner.com

brightpet.info

voicewithchoice.com

bailbondscompany.xyz

7133333333.com

delights.info

gawlvegdr.icu

sdqhpm.com

we2savvyok.com

primallifeathlete.com

gdsinglecell.com

isokineticmachines.com

smartneckrelax.com

gardenvintage.com

hiphopvolume.com

medicapoint.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe
    "C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2540
    • C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe
      "C:\Users\Admin\AppData\Local\Temp\1b58203ecd7ef5d31ea39a5218b40115.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4968

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2540-7-0x0000000008870000-0x000000000890C000-memory.dmp

          Filesize

          624KB

        • memory/2540-10-0x0000000008580000-0x00000000085E8000-memory.dmp

          Filesize

          416KB

        • memory/2540-2-0x00000000075B0000-0x0000000007B54000-memory.dmp

          Filesize

          5.6MB

        • memory/2540-3-0x00000000070B0000-0x0000000007142000-memory.dmp

          Filesize

          584KB

        • memory/2540-4-0x0000000007080000-0x0000000007090000-memory.dmp

          Filesize

          64KB

        • memory/2540-5-0x0000000007190000-0x000000000719A000-memory.dmp

          Filesize

          40KB

        • memory/2540-1-0x0000000000180000-0x0000000000200000-memory.dmp

          Filesize

          512KB

        • memory/2540-8-0x0000000074D70000-0x0000000075520000-memory.dmp

          Filesize

          7.7MB

        • memory/2540-0-0x0000000074D70000-0x0000000075520000-memory.dmp

          Filesize

          7.7MB

        • memory/2540-9-0x0000000007080000-0x0000000007090000-memory.dmp

          Filesize

          64KB

        • memory/2540-6-0x0000000007360000-0x000000000737C000-memory.dmp

          Filesize

          112KB

        • memory/2540-11-0x0000000004680000-0x00000000046B6000-memory.dmp

          Filesize

          216KB

        • memory/2540-14-0x0000000074D70000-0x0000000075520000-memory.dmp

          Filesize

          7.7MB

        • memory/4968-12-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/4968-15-0x0000000001AB0000-0x0000000001DFA000-memory.dmp

          Filesize

          3.3MB