Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-10-2024 09:42

General

  • Target

    bnh.exe

  • Size

    614KB

  • MD5

    c2927f706f2fc5d37767de3f40c8671b

  • SHA1

    457a0cbf5058152f04bcf018534646bbce2b5646

  • SHA256

    1a55fa78a001127ab3e53317fc29487b57343034496594949610a78191156519

  • SHA512

    5c37cba7f9dd2bde172daa6a61a4cd2d1395cb3dd5c8016becb13a5054908b003f416a37016f188d28db8d5e4db9199a0f9983cd52ee1a393d1a23ca75415539

  • SSDEEP

    12288:xMz3Zg6g2zuXCzXDUO03kdwTYDHiwngDa2mYj:xM766g2qSzzRDLnD2m

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

n066

Decoy

elsegundonewhaven.com

miiways.com

tripledstones.com

innerworkshop.vision

kirkgun.com

vivabienrealty.com

estudiopedroleon.com

joannebuyproperty.com

top3wireless.com

kureex.com

theselfieplug.com

citymobileofficial.com

latestgrants.com

atomicstream.com

campingds.com

lesphere.com

kgeorgiades.com

nicktrigili.com

whds60w.com

nutricookinternational.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bnh.exe
    "C:\Users\Admin\AppData\Local\Temp\bnh.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3320
    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
      2⤵
      • Executes dropped EXE
      PID:3284
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3284 -s 188
        3⤵
        • Program crash
        PID:4844
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3284 -ip 3284
    1⤵
      PID:4376

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe

      Filesize

      42KB

      MD5

      9827ff3cdf4b83f9c86354606736ca9c

      SHA1

      e73d73f42bb2a310f03eb1bcbb22be2b8eb7c723

      SHA256

      c1cf3dc8fa1c7fc00f88e07ad539979b3706ca8d69223cffd1d58bc8f521f63a

      SHA512

      8261828d55f3b5134c0aeb98311c04e20c5395d4347251746f3be0fb854f36cc7e118713cd00c9867537e6e47d5e71f2b2384fc00c67f0ae1b285b8310321579

    • memory/3284-16-0x00000000003D0000-0x00000000003F8000-memory.dmp

      Filesize

      160KB

    • memory/3320-6-0x00000000061F0000-0x0000000006228000-memory.dmp

      Filesize

      224KB

    • memory/3320-3-0x0000000004C50000-0x0000000004CE2000-memory.dmp

      Filesize

      584KB

    • memory/3320-4-0x0000000004CF0000-0x0000000004D8C000-memory.dmp

      Filesize

      624KB

    • memory/3320-5-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/3320-0-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

      Filesize

      4KB

    • memory/3320-7-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/3320-8-0x0000000074A7E000-0x0000000074A7F000-memory.dmp

      Filesize

      4KB

    • memory/3320-9-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB

    • memory/3320-11-0x0000000002590000-0x00000000025A4000-memory.dmp

      Filesize

      80KB

    • memory/3320-12-0x00000000025A0000-0x00000000025A6000-memory.dmp

      Filesize

      24KB

    • memory/3320-2-0x0000000005200000-0x00000000057A4000-memory.dmp

      Filesize

      5.6MB

    • memory/3320-1-0x0000000000250000-0x00000000002F0000-memory.dmp

      Filesize

      640KB

    • memory/3320-19-0x0000000074A70000-0x0000000075220000-memory.dmp

      Filesize

      7.7MB