Analysis

  • max time kernel
    122s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:16

General

  • Target

    b.exe

  • Size

    164KB

  • MD5

    abcf9c4951969838d5f6ba1c366628f2

  • SHA1

    ed7503276c7ffbab2caa4ee5162e9bbda42fa921

  • SHA256

    3a273798af77eead6eb9269b272f25c99a26ca3f6c7e38567249f66484f6edec

  • SHA512

    073cbafd67ca5399e32b52cd2bc4b91161799b955d96f53d1549c113e578f6be7464a30b5f9c649db47045d8e0b19cafde150c1d3f7b4b84529016147b3e2572

  • SSDEEP

    3072:MpW/wWQ5EkDbwmSuoUufCzPwcldRhJYPe+rrWbKpDhwi9F4bb:tTHduoD8IcldR8W+rrjp9D9F4b

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

u8cq

Decoy

ardentb.com

kaeltefath.com

galataegitimkurumlari.net

rap8b55d.com

zn9998.com

alvinceremiaam.xyz

whitecorp.net

plandout.com

craftscora.com

katx.info

ruleship.com

qinuxdrone4k.com

vtprealtor.com

serviciomovistar.online

amazon939.com

gm8898.com

housesyrron.com

impqtantaou.com

linksmarttech.net

tubbipets.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1184
      • C:\Users\Admin\AppData\Local\Temp\b.exe
        "C:\Users\Admin\AppData\Local\Temp\b.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2320

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1184-3-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1184-4-0x0000000007B40000-0x0000000007C95000-memory.dmp

      Filesize

      1.3MB

    • memory/1184-8-0x0000000002ED0000-0x0000000002F7F000-memory.dmp

      Filesize

      700KB

    • memory/1184-9-0x0000000002ED0000-0x0000000002F7F000-memory.dmp

      Filesize

      700KB

    • memory/2320-0-0x0000000000750000-0x0000000000A53000-memory.dmp

      Filesize

      3.0MB

    • memory/2320-1-0x0000000000E8D000-0x0000000000E8E000-memory.dmp

      Filesize

      4KB

    • memory/2320-2-0x0000000000E70000-0x0000000000E99000-memory.dmp

      Filesize

      164KB

    • memory/2320-6-0x0000000000E70000-0x0000000000E99000-memory.dmp

      Filesize

      164KB

    • memory/2320-5-0x0000000000E8D000-0x0000000000E8E000-memory.dmp

      Filesize

      4KB