Analysis

  • max time kernel
    118s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02-09-2024 02:48

General

  • Target

    e9e8c1fc6eb0493ccafa4bd8362662e9dcc1de1191c4e2a348f1283a367f0f41.exe

  • Size

    461KB

  • MD5

    5e15f4f0710928ceb2445a10aaa48e9a

  • SHA1

    6d737a3936b878bbd28020326e39c14c4b120003

  • SHA256

    e9e8c1fc6eb0493ccafa4bd8362662e9dcc1de1191c4e2a348f1283a367f0f41

  • SHA512

    416d8abdafbcf11d9a42592a853db81eecc14ddca97b5966c4e13cd5130acc25633b7bb95f580790c1063db733bbe61ca2eeed9781fcef960a3853f084a26757

  • SSDEEP

    6144:O3CDRM9sIkrdnvCgUmCeyCQOEHoXwOK0VEppAcpSK8QGS4mBgESFX0A7:Gf9HmdvCKCepXC50VEpG8NnJgE8X04

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

h3qo

Decoy

dhflow.com

jyindex.com

ezcleanhandle.com

trungtamcongdong.online

simsprotectionagency.com

easylivemeet.com

blackvikingfashionhouse.com

52banxue.com

girlsinit.com

drhemo.com

freethefarmers.com

velvetrosephotography.com

geometricbotaniclas.com

skyandspirit.com

deltacomunicacao.com

mucademy.com

jaboilfieldsolutions.net

howtowinatblackjacknow.com

anytimegrowth.com

simranluthra.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e9e8c1fc6eb0493ccafa4bd8362662e9dcc1de1191c4e2a348f1283a367f0f41.exe
    "C:\Users\Admin\AppData\Local\Temp\e9e8c1fc6eb0493ccafa4bd8362662e9dcc1de1191c4e2a348f1283a367f0f41.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2676
    • C:\Users\Admin\AppData\Local\Temp\e9e8c1fc6eb0493ccafa4bd8362662e9dcc1de1191c4e2a348f1283a367f0f41.exe
      "C:\Users\Admin\AppData\Local\Temp\e9e8c1fc6eb0493ccafa4bd8362662e9dcc1de1191c4e2a348f1283a367f0f41.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2748

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2676-1-0x0000000000090000-0x0000000000190000-memory.dmp

    Filesize

    1024KB

  • memory/2748-3-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-4-0x0000000000820000-0x0000000000B23000-memory.dmp

    Filesize

    3.0MB