Analysis

  • max time kernel
    122s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 20:14 UTC

General

  • Target

    [RFQ] QuotationOrder (SCS).exe

  • Size

    377KB

  • MD5

    505762e94913065a29e28a960c01eff7

  • SHA1

    b61de11b6773224f850e1b8841a983337e5c98ac

  • SHA256

    be900d129c61d09bf730b02647b272a606bc49e204be55d286ccb892edb961ce

  • SHA512

    4a0a62a5cdfd72baf6ec61114d5ef2ecc2e5d6579b7ee3d96452a7a556433d3eefa07aa93ca455e2a097273bcb47ec6838ee4fb3ce0e9eec98b6b999bd16ecf1

  • SSDEEP

    6144:9AuZUs9+QjcGioLPv0eXj2EN9hUeEvNcihGIDXT1WP1buDu53:9Hv9/YoQeVueEvNcih9PYuDut

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

r0bh

Decoy

karo-tasty.com

canlioyuncuyuz.online

app-demo.xyz

fountainspringscapemay.com

completefuid.com

sideroyalpalacehotel.website

tollesonhouses.com

zjef.top

fuckingmom89.xyz

toituresante.com

arabatas.com

trans-mall.com

davidruperezdorao.com

cspro-lb.com

xiluoxtmcwj.com

medicinaoralbarcelona.com

rayganesh.com

bakosaoje.xyz

8nst.com

nigeriasecurityexpo.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe
      "C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe
        "C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"
        3⤵
          PID:2944
        • C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe
          "C:\Users\Admin\AppData\Local\Temp\[RFQ] QuotationOrder (SCS).exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1576
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2632
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 268
          3⤵
          • Program crash
          PID:2296

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1200-17-0x0000000003DB0000-0x0000000003EB0000-memory.dmp

      Filesize

      1024KB

    • memory/1200-25-0x00000000075E0000-0x0000000007714000-memory.dmp

      Filesize

      1.2MB

    • memory/1200-18-0x00000000075E0000-0x0000000007714000-memory.dmp

      Filesize

      1.2MB

    • memory/1576-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1576-13-0x0000000000930000-0x0000000000C33000-memory.dmp

      Filesize

      3.0MB

    • memory/1576-15-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1576-16-0x0000000000280000-0x0000000000291000-memory.dmp

      Filesize

      68KB

    • memory/1576-7-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1576-8-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/1576-11-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2316-0-0x000000007491E000-0x000000007491F000-memory.dmp

      Filesize

      4KB

    • memory/2316-12-0x0000000074910000-0x0000000074FFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2316-4-0x000000007491E000-0x000000007491F000-memory.dmp

      Filesize

      4KB

    • memory/2316-6-0x0000000004C40000-0x0000000004CA0000-memory.dmp

      Filesize

      384KB

    • memory/2316-5-0x0000000074910000-0x0000000074FFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2316-3-0x00000000005B0000-0x00000000005BA000-memory.dmp

      Filesize

      40KB

    • memory/2316-2-0x0000000074910000-0x0000000074FFE000-memory.dmp

      Filesize

      6.9MB

    • memory/2316-1-0x00000000012D0000-0x0000000001334000-memory.dmp

      Filesize

      400KB

    • memory/2632-19-0x00000000009D0000-0x00000000009E4000-memory.dmp

      Filesize

      80KB

    • memory/2632-20-0x00000000009D0000-0x00000000009E4000-memory.dmp

      Filesize

      80KB

    • memory/2632-22-0x00000000009D0000-0x00000000009E4000-memory.dmp

      Filesize

      80KB

    We care about your privacy.

    This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.