Analysis

  • max time kernel
    149s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:19

General

  • Target

    Saipem Global Inquiry.exe

  • Size

    395KB

  • MD5

    60e43cb34adba8f064b71e6fa476c7e3

  • SHA1

    64478dec763afe853f0738d0a64c3734fe7e2b7c

  • SHA256

    d29a75e7c31ae88634a19392137bd4c94d6cf4fb739e0e64eb5624a4a7420e68

  • SHA512

    ffe8d1c0bdb14ccf4cb3c9ec3e1250dd85e9c2d575c0678295b712d8016787df29c18648e48deffda311ea26ca4a8e2b54a59eb797f80ee7675a9d533a8c1fc7

  • SSDEEP

    6144:C6tE6ERQ+3HwO1CcM6RrNev6sKxqfLpEQKk9tF99s2AQuro8Fnh3fOpneW0:CEESo1s6RrNcKwLCQKk9tF9mQOxWg

Malware Config

Extracted

Family

xloader

Version

2.4

Campaign

cxeo

Decoy

realtyfindr.com

littlelakesranchcattle.com

mortgagecollective.online

cortenlogistic.com

healthcaresupplyinc.com

abc1229.com

johnlambertsen.online

yasirweb.tech

1398toftsdr.com

chordsofdevils.com

hemetcondos4sale.com

hdtvstoreonline.com

ultimasnoticiaswfmajide2.xyz

soutu6.com

lastmilefast.com

glveye.icu

countinesices.com

savenroar.com

reiwa.cloud

wendsoue.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe
      "C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2172
      • C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe
        "C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"
        3⤵
          PID:3000
        • C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe
          "C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3004
      • C:\Windows\SysWOW64\wininit.exe
        "C:\Windows\SysWOW64\wininit.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2572
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Saipem Global Inquiry.exe"
          3⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:2696

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1192-18-0x00000000063C0000-0x00000000064F0000-memory.dmp

      Filesize

      1.2MB

    • memory/1192-17-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1192-23-0x00000000063C0000-0x00000000064F0000-memory.dmp

      Filesize

      1.2MB

    • memory/1192-25-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/2172-6-0x0000000004A20000-0x0000000004A74000-memory.dmp

      Filesize

      336KB

    • memory/2172-5-0x0000000074300000-0x00000000749EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2172-4-0x000000007430E000-0x000000007430F000-memory.dmp

      Filesize

      4KB

    • memory/2172-3-0x00000000003B0000-0x00000000003C2000-memory.dmp

      Filesize

      72KB

    • memory/2172-2-0x0000000074300000-0x00000000749EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2172-0-0x000000007430E000-0x000000007430F000-memory.dmp

      Filesize

      4KB

    • memory/2172-12-0x0000000074300000-0x00000000749EE000-memory.dmp

      Filesize

      6.9MB

    • memory/2172-1-0x0000000000090000-0x00000000000F8000-memory.dmp

      Filesize

      416KB

    • memory/2572-22-0x00000000000D0000-0x00000000000F9000-memory.dmp

      Filesize

      164KB

    • memory/2572-21-0x0000000000540000-0x000000000055A000-memory.dmp

      Filesize

      104KB

    • memory/2572-19-0x0000000000540000-0x000000000055A000-memory.dmp

      Filesize

      104KB

    • memory/3004-8-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3004-15-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3004-16-0x0000000000240000-0x0000000000251000-memory.dmp

      Filesize

      68KB

    • memory/3004-13-0x0000000000A00000-0x0000000000D03000-memory.dmp

      Filesize

      3.0MB

    • memory/3004-9-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/3004-11-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3004-7-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB