Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:19

General

  • Target

    DCC_PO001070322.exe

  • Size

    831KB

  • MD5

    3fcf09742679131c0e4a202b27503a5b

  • SHA1

    89a9926ffa6e44f4a38ea5a6f5ea768d29be0715

  • SHA256

    2710360c68d0074ff1ec1eae99a680106bd6076b2602ad94025bdeb5b2779da0

  • SHA512

    3342ec3a1a80872937d3d71145ad8f0e4d830f6dca69890c985081fb9b876319637c7a0cc63d7db2bbe9e3dc038385482171b483ce64f61527367755b8eb2f3b

  • SSDEEP

    12288:Z/xpFtK4DZFUswOeoQeuNNZz0PytzIx3GPvibvUWORFkS41a6EAmD:9vFtKKZcvo0z/9Ix2XibvlTa6

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

yig8

Decoy

lifecallingbootcamp.com

atlantamobilethaibodywork.com

pear-works.com

ffmagic.com

thenewivhubboston.com

bemusedwsettr.top

beausoutdoors.net

tminus-10.com

pinnacle-legal-services.com

maralgroups.com

easywhiff.com

dentalimplantspracticesbcan.com

monokrom.art

fadak-njf.com

eco1tnpasumo5.xyz

gites-cougousse.com

pittsburgheyecare.com

acami.art

highlow-bnr.info

azienda-agricola-stellino.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 5 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer settings 1 TTPs 34 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SetWindowsHookEx 8 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\DCC_PO001070322.exe
      "C:\Users\Admin\AppData\Local\Temp\DCC_PO001070322.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2316
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://yip.su/2VBBt6
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2880
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2880 CREDAT:275457 /prefetch:2
          4⤵
          • System Location Discovery: System Language Discovery
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:2740
      • C:\Windows\SysWOW64\dpnsvr.exe
        "C:\Windows\SysWOW64\dpnsvr.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2592
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1532
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\dpnsvr.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2332

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    914B

    MD5

    e4a68ac854ac5242460afd72481b2a44

    SHA1

    df3c24f9bfd666761b268073fe06d1cc8d4f82a4

    SHA256

    cb3ccbb76031e5e0138f8dd39a23f9de47ffc35e43c1144cea27d46a5ab1cb5f

    SHA512

    5622207e1ba285f172756f6019af92ac808ed63286e24dfecc1e79873fb5d140f1ceb7133f2476e89a5f75f711f9813a9fbb8fd5287f64adfdcc53b864f9bdc5

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\3C428B1A3E5F57D887EC4B864FAC5DCC

    Filesize

    252B

    MD5

    95967f48178fb64d9044a5c76a9fd40a

    SHA1

    1dcd927e1f9f1b85a832e05ca7efcea0be84a0dd

    SHA256

    50c643bd520890696e6c9f52501c6e535312e8f823410e7971058b2ddc47489d

    SHA512

    95ce2266deab2f030fee3dd9227b14edbd94d52a7aad7f9bc5a8ae426310b2e8720e1cbf8d8e6fd509af739d45852ecfa794e56cbc4eb627458ce060755d62b6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    772dd307fcbf7364194da76e31b34da9

    SHA1

    2027ddb45658adab523eb7314b927e763176f996

    SHA256

    83625714ecad0cefaf0d112c8714d5b7a01de0b625187074782715c1ccf3555a

    SHA512

    dc36bb3089bdf67000c93dbba87ac4a160cf32292d37428d7dca053abe75de413126ed8027b526f040b701653719350319e798b603488c70a0b2ff5a5df74ac4

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    33cd34e26d6a92b794694c5dc4a2d6cb

    SHA1

    290e6e60caac6077a261f2177077a712192214a3

    SHA256

    80414bb9b786df11687af57c96be75e12eeb750b9d6ad9502c1c04d9db1fe351

    SHA512

    a6d888f6ef24648d16e2faa01f8cc134d7330f7d6e6abb47ddd4a1a324b32f1db7ebad7e6233dcb2e4853cf3a37dd6f40de0c8f016d5f9d9ecc013c1db29ead0

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    cd0c7845eb539c60ae43edc13c660c59

    SHA1

    c6d1177d8c90648d19914e5e10d773c4432e3d76

    SHA256

    fe3d07927b2a136389e46c44c88b4b6596b3c920c37a36482a72126bb34634f2

    SHA512

    e8b77e8c78a9f0e927eccea2903ec90df03254f938e16029922f506ca57f370b155203c66781566a66e2d47bbe185271d163ce133a50a7143a31ac64abce07b2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    68b05851282eb9386a3a6c659c2262b2

    SHA1

    c01fe3a8216926b93be4e4d065c4ce89c9f455e0

    SHA256

    c7fb5fd63f756a7f454f97c4448951b6f461071ffab7a4032b7744ddf7d3fe38

    SHA512

    69b3ee5afb14e04686b1a0dc388ee3def325869f2688d642859b65454e4c839e04f3e33e4bb98e8f2ffb93bb934d867b0359436aa1ae3d85df16f12d9d4a2c28

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    59848924ed61ae8c34133d16c3fafe11

    SHA1

    0aec69976e8da5443919a9e9ce368dea0a542b7a

    SHA256

    8b678618935dcd0aa882a1946bf42885e8324ca818bfb278ad5d734527bc45c6

    SHA512

    cff2c3f972302f18e19ede9d03b5fada36db54062d7d6cb6627b7aaa4fb18a81168ca3349ece956e9061f6a9411fa8672d44fe1dbf1bb2a1c67de646b4ce923a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    3b77c6a15c9a3512893a8867a64ee89f

    SHA1

    5b086ebd8972fc78d793d34ac463899fee2f74ed

    SHA256

    0ce0ee59b57894e2f78714c02300b3cd188ee9e1149861bc5069578897790562

    SHA512

    19e6f4be205cffdeea94251c0d648a4b82458e6b8eb688d569649f02050d710ca32ccc5896d7c7e8e710312595a26a4cf2befa3e744cb3e0d74954c81954160b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    679f812eece4c2b807cf815293ae4022

    SHA1

    72bdbe036167bc7203ad51bb0c4c7ae2f5d405f7

    SHA256

    58cc7b3ecf9f2db2815b13925461bbde0926f950bf4cae431cac99dca9d50e48

    SHA512

    3a22da3b641ee4268de9ef0638dbca403e003803be9be3bbabfb3866e560d6d3c87c386f8a770d69f3c11b82cbd27091559689f9d1ac6ffac78ef44cf5e1373b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    23376fa9e14788a3a13312016874f046

    SHA1

    900ed1278084451a29372aaa6e3323300bd427cf

    SHA256

    61a3a5abe711fea37436c6359266d9d912c329e2d8efcc4706f586d63e6ddf12

    SHA512

    d0ac11397d1b5dd6bff078e1541ff1caaf62cfa1a0ea318a9981f8cec92d5c5057cfb8b388b533be59ef7facaf79d0df7f8d74052942dc757706c3ba9cf3c74f

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    f16d4e4eb42ba8b9a08d14a5bde8cedc

    SHA1

    df1236341c6e1dbaa7829f45a1626f473861fe5e

    SHA256

    2ec1500be2152d1f93b7383a997cb23c159986b0e44dbcfd0e351d6851c4fcde

    SHA512

    4dad16886fb5b1c7a2606a5ef142b0807d018f11128615c9597c9311d689ba35ea51a89e14e08f21ce67fdb2a968f4c222bd4128b97cb0972053432f9b841e66

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e9da6ec6a0b01512bdb0aec216ab29a3

    SHA1

    1f74a27fdcbb1f7c9baeef0f9042412475d784b9

    SHA256

    d1ee2e7dc6097bd9dcfaf070d93a1106a89d1e067b99401c5900ee76fac714dc

    SHA512

    27d6c233f64b30a0c1ca69810a13b192e45c3eb071e4a99566d083887f9ac264058d4a0b2211d46c3d9bfdedd414d0b95df456e1be3731824fb2fde21c5b1a34

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    e7e35b0faa3a0ac807ec05f25886b247

    SHA1

    4a5d13d54e862bf03668886290b15dbea8b046e3

    SHA256

    89fae956fb0882927976894b61e7f9d969a4a834a6554243a9eb8f7802b39668

    SHA512

    8060d8525f789caa642c4b9389078a4bba6aaa9cb3553cc30a0f9cd50ddf557e279db5381ef333c469dc46ee725e671f2c799defae6bb1296aa364884a9d641e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    4174e6c761e2f6d95b8285f710fee2ef

    SHA1

    8d7a3240dda6650de33e994fbb21a1b408f91739

    SHA256

    bbf834606a8a7ca570f99f8a3a6704596bb337be01d3c4a2646aa41c377a4d66

    SHA512

    4b81dac20252f6da6368f4acd7efcdd98188cba38d511e4338b1db3e0d62b37bf1197dda38e785a3852354469a47f342148906aa1681ea776034a331ce4036d2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    ace275366c5af68578aac27d9c3e53fe

    SHA1

    14913a13c138f2d29ff1fb3767205f440f171e1c

    SHA256

    173a33e2c894dad75cfd6c11856efdaf0c876666adc2955891dab1fa848d6ca1

    SHA512

    fb238c1c2481635c102dbe8a8d542ccfde9fb96242c5c31bf7aae000b6f8ced7ae4af4eb08c3904b8e4ca837b8abec8a88b31064f7398c22bbee0e1c273b37e8

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    71cfcdc433d9cc70fd206c155fbcbfb9

    SHA1

    55be2f6565853d2626ae7e9452c9b56534c98069

    SHA256

    59be3b44f4b148c2a269cea247d29b868e7db352fc3e87da7e945bc5137c2450

    SHA512

    d23d01e5c2859d15ff676c6ac27c445966d5dfed0c3f3f7919abd0ad26e683da2f3f9a6c40fd90757109507b6f3e0c14c091b9b873ecf8b4c1576baccda6b253

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    558ccce798c3e39ba860c2312b52fabb

    SHA1

    c7d792717eaca6ab0394ed6155f3f6db213289e4

    SHA256

    2999990f6c2e9980e17efa2fe327c030ece40a211a3f8afb4155ac9e948e722a

    SHA512

    518c35d4645f5dcb4a357fe6128b29f155a2a62ba455c26347dd3c1f604e6b3e123d730f26164490aaebd76efc255198ac59489904332c92c4268cbe92e84b93

  • C:\Users\Admin\AppData\Local\Temp\Cab8C89.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\Tar8BA.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • memory/1252-62-0x0000000006580000-0x0000000006688000-memory.dmp

    Filesize

    1.0MB

  • memory/1252-58-0x0000000006580000-0x0000000006688000-memory.dmp

    Filesize

    1.0MB

  • memory/1252-64-0x00000000000B0000-0x00000000001B0000-memory.dmp

    Filesize

    1024KB

  • memory/1252-57-0x0000000004390000-0x000000000443E000-memory.dmp

    Filesize

    696KB

  • memory/1252-70-0x0000000006690000-0x00000000067DC000-memory.dmp

    Filesize

    1.3MB

  • memory/1252-21-0x0000000004390000-0x000000000443E000-memory.dmp

    Filesize

    696KB

  • memory/1252-20-0x00000000000B0000-0x00000000001B0000-memory.dmp

    Filesize

    1024KB

  • memory/1532-59-0x0000000000E00000-0x0000000000EF4000-memory.dmp

    Filesize

    976KB

  • memory/1532-60-0x0000000000E00000-0x0000000000EF4000-memory.dmp

    Filesize

    976KB

  • memory/1532-61-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB

  • memory/2316-7-0x00000000009E0000-0x0000000000A0C000-memory.dmp

    Filesize

    176KB

  • memory/2316-47-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-0-0x000000007489E000-0x000000007489F000-memory.dmp

    Filesize

    4KB

  • memory/2316-22-0x000000007489E000-0x000000007489F000-memory.dmp

    Filesize

    4KB

  • memory/2316-23-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-6-0x00000000054D0000-0x000000000558C000-memory.dmp

    Filesize

    752KB

  • memory/2316-4-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-5-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-3-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-2-0x0000000074890000-0x0000000074F7E000-memory.dmp

    Filesize

    6.9MB

  • memory/2316-1-0x0000000000B80000-0x0000000000C56000-memory.dmp

    Filesize

    856KB

  • memory/2592-15-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2592-55-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2592-56-0x00000000002A0000-0x00000000002B1000-memory.dmp

    Filesize

    68KB

  • memory/2592-18-0x00000000001A0000-0x00000000001B1000-memory.dmp

    Filesize

    68KB

  • memory/2592-19-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2592-16-0x0000000000980000-0x0000000000C83000-memory.dmp

    Filesize

    3.0MB

  • memory/2592-8-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2592-10-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2592-12-0x0000000000400000-0x000000000043A000-memory.dmp

    Filesize

    232KB

  • memory/2592-13-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB