Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:14

General

  • Target

    29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe

  • Size

    607KB

  • MD5

    5d6ee890a6926afe19c29151a45bb616

  • SHA1

    c9d95f0b419c5222016879c7e40cfce8c2d5a751

  • SHA256

    29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc

  • SHA512

    307dae8b0f5dc8a9f3cbcf9c0a0e0e25d7b3bc25d7c13eab29d0bc3b00db8f6370ddd25c6202673feb95c54e58702f1b7fa84749648b732913993d73f3b33a59

  • SSDEEP

    12288:jWYxaM8KuQq/b3FhL30Z/wSt5KECWAhmEq5Em:MjQSb3rLa/9WthmEqu

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

cpa3

Decoy

tabbys.art

az5t2mceh9p88.net

victorloubaque.com

artesublime.life

trends.fan

connectpeople2land.com

seodrift.com

carpetcleaningtexas.com

ibimedia.net

whizkeyopc.xyz

blazedisinfecting.com

high55.com

tunemydatabase.com

adoptidmind.com

evuevobjtwwnajtk.com

sonoranrp.com

modelbyvmj.com

jpsalesouth.site

wsezs.com

sanamostodos.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe
    "C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2168
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\RskdzZmXPGEAWj" /XML "C:\Users\Admin\AppData\Local\Temp\tmp317C.tmp"
      2⤵
      • System Location Discovery: System Language Discovery
      • Scheduled Task/Job: Scheduled Task
      PID:2884
    • C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe
      "C:\Users\Admin\AppData\Local\Temp\29dd69cfbede950f9d60f73f37b6ef375ecafce6a76e39f4be04cb5b018b5bfc.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 36
        3⤵
        • Program crash
        PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2168-6-0x00000000051F0000-0x0000000005256000-memory.dmp

    Filesize

    408KB

  • memory/2168-1-0x0000000001120000-0x00000000011BE000-memory.dmp

    Filesize

    632KB

  • memory/2168-2-0x0000000074700000-0x0000000074DEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2168-3-0x0000000000450000-0x000000000045E000-memory.dmp

    Filesize

    56KB

  • memory/2168-4-0x000000007470E000-0x000000007470F000-memory.dmp

    Filesize

    4KB

  • memory/2168-5-0x0000000074700000-0x0000000074DEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2168-0-0x000000007470E000-0x000000007470F000-memory.dmp

    Filesize

    4KB

  • memory/2168-7-0x0000000000A80000-0x0000000000AB0000-memory.dmp

    Filesize

    192KB

  • memory/2168-19-0x0000000074700000-0x0000000074DEE000-memory.dmp

    Filesize

    6.9MB

  • memory/2768-18-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2768-16-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2768-15-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2768-14-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB