Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:16

General

  • Target

    b.exe

  • Size

    164KB

  • MD5

    abcf9c4951969838d5f6ba1c366628f2

  • SHA1

    ed7503276c7ffbab2caa4ee5162e9bbda42fa921

  • SHA256

    3a273798af77eead6eb9269b272f25c99a26ca3f6c7e38567249f66484f6edec

  • SHA512

    073cbafd67ca5399e32b52cd2bc4b91161799b955d96f53d1549c113e578f6be7464a30b5f9c649db47045d8e0b19cafde150c1d3f7b4b84529016147b3e2572

  • SSDEEP

    3072:MpW/wWQ5EkDbwmSuoUufCzPwcldRhJYPe+rrWbKpDhwi9F4bb:tTHduoD8IcldR8W+rrjp9D9F4b

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

u8cq

Decoy

ardentb.com

kaeltefath.com

galataegitimkurumlari.net

rap8b55d.com

zn9998.com

alvinceremiaam.xyz

whitecorp.net

plandout.com

craftscora.com

katx.info

ruleship.com

qinuxdrone4k.com

vtprealtor.com

serviciomovistar.online

amazon939.com

gm8898.com

housesyrron.com

impqtantaou.com

linksmarttech.net

tubbipets.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3568
    • C:\Users\Admin\AppData\Local\Temp\b.exe
      "C:\Users\Admin\AppData\Local\Temp\b.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:4944
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4056
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\b.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:3732

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3568-3-0x0000000008920000-0x0000000008A75000-memory.dmp

    Filesize

    1.3MB

  • memory/3568-8-0x0000000008920000-0x0000000008A75000-memory.dmp

    Filesize

    1.3MB

  • memory/3568-10-0x0000000008D10000-0x0000000008E36000-memory.dmp

    Filesize

    1.1MB

  • memory/3568-11-0x0000000008D10000-0x0000000008E36000-memory.dmp

    Filesize

    1.1MB

  • memory/3568-13-0x0000000008D10000-0x0000000008E36000-memory.dmp

    Filesize

    1.1MB

  • memory/4056-4-0x0000000000420000-0x0000000000437000-memory.dmp

    Filesize

    92KB

  • memory/4056-6-0x0000000000420000-0x0000000000437000-memory.dmp

    Filesize

    92KB

  • memory/4056-7-0x0000000000C80000-0x0000000000CA9000-memory.dmp

    Filesize

    164KB

  • memory/4944-0-0x0000000001610000-0x000000000195A000-memory.dmp

    Filesize

    3.3MB

  • memory/4944-2-0x00000000001D0000-0x00000000001F9000-memory.dmp

    Filesize

    164KB

  • memory/4944-1-0x00000000001ED000-0x00000000001EE000-memory.dmp

    Filesize

    4KB