Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-04-2024 06:11

General

  • Target

    $PLUGINSDIR/evpz.dll

  • Size

    32KB

  • MD5

    c820bfe346d35f1ed0d3017cadb8f16d

  • SHA1

    a98131691df2b4445124304307130888050fe410

  • SHA256

    439e5f590b4bea13a9bfb7c94bbd8fa99f45a310dc44c241db2375b4e8923cb3

  • SHA512

    7d89e8677b46c3456559a0061f992be6169c63ec6a2a2eb7ec73ff36fe1fc28cbdbf3436c74fe528572b14f6865ec0f03e5480782243674ffc4423a00cefc66f

  • SSDEEP

    384:uIbr7TBKwNuNjiVMauKBO1AhvxF756rLAK5GNrPAg9K8OtwBpYxjETl7:uIZfYNjCy1kxFsr5GNr195OccETp

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

mxnu

Decoy

insightmyhome.com

gabriellamaxey.com

029atk.xyz

marshconstructions.com

technichoffghosts.com

blue-ivy-boutique-au.com

1sunsetgroup.com

elfkuhnispb.store

caoliudh.club

verifiedpaypal.net

jellyice-tr.com

gatescres.com

bloomberq.online

crystaltopagent.net

uggs-line.com

ecommerceplatform.xyz

historyofcambridge.com

sattaking-gaziabad.xyz

digisor.com

beachpawsmobilegrooming.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 25 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Windows\system32\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\evpz.dll,#1
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1476
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\evpz.dll,#1
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1416
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\evpz.dll,#1
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2136
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:1856
      • C:\Windows\SysWOW64\colorcpl.exe
        "C:\Windows\SysWOW64\colorcpl.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2180
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\SysWOW64\rundll32.exe"
          3⤵
            PID:2720

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1196-7-0x0000000002C20000-0x0000000002D20000-memory.dmp
        Filesize

        1024KB

      • memory/1196-17-0x0000000006000000-0x000000000617E000-memory.dmp
        Filesize

        1.5MB

      • memory/1196-8-0x0000000006000000-0x000000000617E000-memory.dmp
        Filesize

        1.5MB

      • memory/1416-2-0x0000000010000000-0x000000001000B000-memory.dmp
        Filesize

        44KB

      • memory/1416-0-0x0000000010000000-0x000000001000B000-memory.dmp
        Filesize

        44KB

      • memory/2136-3-0x0000000001EF0000-0x00000000021F3000-memory.dmp
        Filesize

        3.0MB

      • memory/2136-6-0x0000000000380000-0x0000000000391000-memory.dmp
        Filesize

        68KB

      • memory/2136-5-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/2136-1-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/2180-9-0x0000000000490000-0x00000000004A8000-memory.dmp
        Filesize

        96KB

      • memory/2180-10-0x0000000000490000-0x00000000004A8000-memory.dmp
        Filesize

        96KB

      • memory/2180-11-0x0000000000080000-0x00000000000A9000-memory.dmp
        Filesize

        164KB

      • memory/2180-12-0x0000000001FE0000-0x00000000022E3000-memory.dmp
        Filesize

        3.0MB

      • memory/2180-13-0x0000000000080000-0x00000000000A9000-memory.dmp
        Filesize

        164KB

      • memory/2180-15-0x0000000001CF0000-0x0000000001D80000-memory.dmp
        Filesize

        576KB