Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-07-2024 23:44

General

  • Target

    IMG_501327.exe

  • Size

    462KB

  • MD5

    1f11cb76d8f9643820a756448b4b3a0e

  • SHA1

    c00db72ff5681b1f26db430a71b35dcfe3978d1c

  • SHA256

    aaf1000d1f4822bb6e7424123c807a333a8696783ab029b49df8250b115c27ae

  • SHA512

    2e1c2c46233b1a995e234ff7dd5a876a2230e06dc5ee6da3fdd3a890ce2f43bb57e0faee14c3094c80d99f435d42b7e13c845d885f82c2b2d31961cc1db2b3cc

  • SSDEEP

    12288:pFda+FdagEMYLZsUN8dgHgY8RfuydvDZ0da7Af:bEMfrdc8Zhdd

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

mt6e

Decoy

morozolga.com

selimtokdemir.com

deluxeweldingsupply.com

allannateddyrose.com

iconsneakersfr.com

vicenteconchilla.com

themediatenow.com

finishmybasemint.com

blaseskincare.com

betwho.site

madewithrealmeat.com

scratchpatchinc.com

daysad.com

kraftwater.com

prolifictrades.com

usdtmgm.com

mooneworms.com

grandspecialiste.com

mirzaassociates.com

bilaltahirofficial.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Xloader payload 3 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Using powershell.exe command.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3556
    • C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe
      "C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\Powershell.exe
        "Powershell.exe" -ExecutionPolicy Bypass -command Copy-Item 'C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe' 'C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Drivers.exe'
        3⤵
        • Drops startup file
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:4440
      • C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe
        "C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:840
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\IMG_501327.exe"
        3⤵
          PID:2336

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_d13zntsh.0js.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • memory/840-34-0x0000000001510000-0x000000000185A000-memory.dmp

      Filesize

      3.3MB

    • memory/840-35-0x0000000001090000-0x00000000010A0000-memory.dmp

      Filesize

      64KB

    • memory/840-36-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/840-29-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1244-8-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-3-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-7-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/1244-0-0x0000000074D7E000-0x0000000074D7F000-memory.dmp

      Filesize

      4KB

    • memory/1244-2-0x0000000005CC0000-0x0000000006264000-memory.dmp

      Filesize

      5.6MB

    • memory/1244-30-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/1244-4-0x00000000057B0000-0x0000000005842000-memory.dmp

      Filesize

      584KB

    • memory/1244-26-0x0000000005790000-0x00000000057A6000-memory.dmp

      Filesize

      88KB

    • memory/1244-6-0x0000000005950000-0x00000000059EC000-memory.dmp

      Filesize

      624KB

    • memory/1244-1-0x0000000000D00000-0x0000000000D7A000-memory.dmp

      Filesize

      488KB

    • memory/1244-5-0x0000000005850000-0x00000000058AE000-memory.dmp

      Filesize

      376KB

    • memory/3556-55-0x0000000003100000-0x0000000003192000-memory.dmp

      Filesize

      584KB

    • memory/3556-37-0x0000000003220000-0x00000000032F4000-memory.dmp

      Filesize

      848KB

    • memory/4356-46-0x0000000000440000-0x0000000000456000-memory.dmp

      Filesize

      88KB

    • memory/4356-45-0x0000000000440000-0x0000000000456000-memory.dmp

      Filesize

      88KB

    • memory/4356-47-0x00000000004E0000-0x0000000000509000-memory.dmp

      Filesize

      164KB

    • memory/4440-14-0x0000000005F20000-0x0000000005F86000-memory.dmp

      Filesize

      408KB

    • memory/4440-31-0x00000000065D0000-0x00000000065EE000-memory.dmp

      Filesize

      120KB

    • memory/4440-25-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4440-20-0x0000000005F90000-0x00000000062E4000-memory.dmp

      Filesize

      3.3MB

    • memory/4440-12-0x0000000005600000-0x0000000005622000-memory.dmp

      Filesize

      136KB

    • memory/4440-33-0x0000000006600000-0x000000000664C000-memory.dmp

      Filesize

      304KB

    • memory/4440-38-0x0000000006B40000-0x0000000006BD6000-memory.dmp

      Filesize

      600KB

    • memory/4440-39-0x0000000006AC0000-0x0000000006ADA000-memory.dmp

      Filesize

      104KB

    • memory/4440-40-0x0000000006B10000-0x0000000006B32000-memory.dmp

      Filesize

      136KB

    • memory/4440-44-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4440-13-0x00000000057B0000-0x0000000005816000-memory.dmp

      Filesize

      408KB

    • memory/4440-11-0x0000000005880000-0x0000000005EA8000-memory.dmp

      Filesize

      6.2MB

    • memory/4440-10-0x0000000074D70000-0x0000000075520000-memory.dmp

      Filesize

      7.7MB

    • memory/4440-9-0x0000000002CA0000-0x0000000002CD6000-memory.dmp

      Filesize

      216KB