Analysis

  • max time kernel
    146s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 22:32

General

  • Target

    5093699e2b2728073ebfe205b1e27778235dcf9aff5b7d25ad38f23aea9ec50c.exe

  • Size

    242KB

  • MD5

    5458ee05655d3e4a69fd7c319c7324bf

  • SHA1

    97ece65057682bfadba8b71284f42a5503fa66e7

  • SHA256

    5093699e2b2728073ebfe205b1e27778235dcf9aff5b7d25ad38f23aea9ec50c

  • SHA512

    770c7cf6ca443f913d8621db56447ac56abe137c0c5cdb7c77feaf024e6f6bc98a908d5e9bc425214961a252666f3a3fd4991c8dbb8b8af65378ad58b9d107c1

  • SSDEEP

    6144:HNeZmAqvt7GQyo4Opdjv/Ml4TVS+8+1vcTjO+M:HNlNl7Gv0nMlWNh1vcPzM

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

xc52

Decoy

thelukeliu.com

solarpointinc.com

41mpt.xyz

giangsontaikhoi.com

bqyiiq.space

aguw.top

xetnghiemdany.com

xn--jsrs15bbg5a.com

xcflora.com

socfasderldecv.com

vitginmobile.com

myvirtualtrophy.com

zubr-service.online

saremira.com

baoanforum.com

pizzafolk.net

clararsjajno.quest

beennow.com

sumou-sa.com

sondelicias.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1268
      • C:\Users\Admin\AppData\Local\Temp\5093699e2b2728073ebfe205b1e27778235dcf9aff5b7d25ad38f23aea9ec50c.exe
        "C:\Users\Admin\AppData\Local\Temp\5093699e2b2728073ebfe205b1e27778235dcf9aff5b7d25ad38f23aea9ec50c.exe"
        2⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2376
        • C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe
          C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe C:\Users\Admin\AppData\Local\Temp\ftufltq
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2172
          • C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe
            C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe C:\Users\Admin\AppData\Local\Temp\ftufltq
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1644
            • C:\Windows\SysWOW64\mstsc.exe
              "C:\Windows\SysWOW64\mstsc.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • System Location Discovery: System Language Discovery
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2864
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Local\Temp\seuxwbcie.exe"
                6⤵
                • System Location Discovery: System Language Discovery
                PID:2932

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\4th7ia948nr

      Filesize

      213KB

      MD5

      e4467ca5cb5c461ddd7b346bc354d987

      SHA1

      8fb54c8955bf390eb192c8c7d26defcd673cf12a

      SHA256

      f865b3cd97a06023b5223cf09fa9d96e4ddac420a94ebd896283c44519cc67e9

      SHA512

      d1045176ad555fa7d8ad7e790b3c507cbdecc507efef276a34bd54d6fe52fc356f55fbd3a1dd0be25c77b6f40ab3e75637384c71587d98403de61bf39ad3d4c9

    • C:\Users\Admin\AppData\Local\Temp\ftufltq

      Filesize

      4KB

      MD5

      74c5e9bd4b4a2b4893142993e7e5081b

      SHA1

      1f8366b183fe62f87f69aa776ec31765270cfad8

      SHA256

      b1d56d21881bfcb60b382ee61976e649aa9579059a167ccc3ef3808d744d395d

      SHA512

      c4d87d1bf07b5d1d45747f0e813c612f12affca2d34426c84adac372264d45c2d20707997377204c8419e9f6fcb72128fed2a0328b1041639af1efd7efcc9790

    • \Users\Admin\AppData\Local\Temp\seuxwbcie.exe

      Filesize

      4KB

      MD5

      a76d9b231af273f403da413af9b6fe1d

      SHA1

      30c52ca472a94e2b9535468a84e19ba790472590

      SHA256

      86c1a081301f284a88a5e5e6004f4de35c01550119b159ba2fa43b144958e1b6

      SHA512

      25f41ebb2226a3b4e1f06d653345a1252d20a8fade7b6c2e474174cbcc6c071077ef849286fa23565d78f0cf55b9a5bd24c2df91916f1c49ec5aa090192a5aa9

    • memory/1268-19-0x0000000004EA0000-0x0000000004F5E000-memory.dmp

      Filesize

      760KB

    • memory/1268-22-0x0000000006BF0000-0x0000000006D0F000-memory.dmp

      Filesize

      1.1MB

    • memory/1268-23-0x0000000004EA0000-0x0000000004F5E000-memory.dmp

      Filesize

      760KB

    • memory/1268-29-0x0000000006BF0000-0x0000000006D0F000-memory.dmp

      Filesize

      1.1MB

    • memory/1644-15-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1644-18-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1644-21-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2172-11-0x0000000000220000-0x0000000000222000-memory.dmp

      Filesize

      8KB

    • memory/2864-27-0x0000000000D00000-0x0000000000E04000-memory.dmp

      Filesize

      1.0MB

    • memory/2864-28-0x0000000000D00000-0x0000000000E04000-memory.dmp

      Filesize

      1.0MB

    • memory/2864-30-0x0000000000080000-0x00000000000A9000-memory.dmp

      Filesize

      164KB