Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-08-2024 09:01

General

  • Target

    P.O-48452689535945.exe

  • Size

    521KB

  • MD5

    579c372392d600a9ef621ae4c1f7341a

  • SHA1

    e4fb160d99727aa5ffee784c9a5f52f6581704ee

  • SHA256

    f564f410274ccf48d4513984d1da95edefa874a555f5e7d95fae7f9cc1f46b6b

  • SHA512

    1c744f5d9b4bb04e0ed84bc66ad6a4970e2ff18da28a4c2b9910683821c6fe43ad585e22c56fbb26e1c0db547c7e58d432ffb9c1186da81b47c7f13e7335755f

  • SSDEEP

    6144:0uq2lrmbYS9j7tCiyEKAm63z9EZgVY+RQbwesfqFi/mpZ5bjf9VAZUUryjzbi:0WCbYQjoiuM3J0CyFzxVAZnreXi

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

h3qo

Decoy

dhflow.com

jyindex.com

ezcleanhandle.com

trungtamcongdong.online

simsprotectionagency.com

easylivemeet.com

blackvikingfashionhouse.com

52banxue.com

girlsinit.com

drhemo.com

freethefarmers.com

velvetrosephotography.com

geometricbotaniclas.com

skyandspirit.com

deltacomunicacao.com

mucademy.com

jaboilfieldsolutions.net

howtowinatblackjacknow.com

anytimegrowth.com

simranluthra.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Beds Protector Packer 1 IoCs

    Detects Beds Protector packer used to load .NET malware.

  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3524
    • C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe
      "C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe
        "C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:228
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1040
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\P.O-48452689535945.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/228-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/228-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/228-18-0x0000000003170000-0x0000000003180000-memory.dmp

    Filesize

    64KB

  • memory/228-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/228-14-0x0000000001350000-0x0000000001360000-memory.dmp

    Filesize

    64KB

  • memory/228-11-0x0000000001540000-0x000000000188A000-memory.dmp

    Filesize

    3.3MB

  • memory/1040-21-0x0000000000AC0000-0x0000000000ACA000-memory.dmp

    Filesize

    40KB

  • memory/1040-20-0x0000000000AC0000-0x0000000000ACA000-memory.dmp

    Filesize

    40KB

  • memory/1040-22-0x0000000000760000-0x0000000000789000-memory.dmp

    Filesize

    164KB

  • memory/3364-4-0x0000000004FD0000-0x000000000502E000-memory.dmp

    Filesize

    376KB

  • memory/3364-6-0x0000000074D10000-0x00000000754C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3364-7-0x0000000005050000-0x0000000005066000-memory.dmp

    Filesize

    88KB

  • memory/3364-3-0x0000000005070000-0x0000000005102000-memory.dmp

    Filesize

    584KB

  • memory/3364-5-0x00000000051B0000-0x000000000524C000-memory.dmp

    Filesize

    624KB

  • memory/3364-0-0x0000000074D1E000-0x0000000074D1F000-memory.dmp

    Filesize

    4KB

  • memory/3364-2-0x0000000005620000-0x0000000005BC4000-memory.dmp

    Filesize

    5.6MB

  • memory/3364-1-0x00000000005C0000-0x0000000000648000-memory.dmp

    Filesize

    544KB

  • memory/3364-10-0x0000000074D10000-0x00000000754C0000-memory.dmp

    Filesize

    7.7MB

  • memory/3524-19-0x00000000089A0000-0x0000000008ADA000-memory.dmp

    Filesize

    1.2MB

  • memory/3524-15-0x0000000008740000-0x00000000088C6000-memory.dmp

    Filesize

    1.5MB

  • memory/3524-23-0x0000000008740000-0x00000000088C6000-memory.dmp

    Filesize

    1.5MB

  • memory/3524-25-0x00000000089A0000-0x0000000008ADA000-memory.dmp

    Filesize

    1.2MB

  • memory/3524-27-0x0000000008C20000-0x0000000008D31000-memory.dmp

    Filesize

    1.1MB

  • memory/3524-28-0x0000000008C20000-0x0000000008D31000-memory.dmp

    Filesize

    1.1MB

  • memory/3524-32-0x0000000008C20000-0x0000000008D31000-memory.dmp

    Filesize

    1.1MB