Analysis

  • max time kernel
    120s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:19

General

  • Target

    4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe

  • Size

    1.1MB

  • MD5

    3702c5efbf064afe0436e61bc355ca94

  • SHA1

    5760a5ed8d7d0b30e1c06530df6c6ef5a44de572

  • SHA256

    4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897

  • SHA512

    4d7e47565d3c9ceff0ec1ba1e7ae56abf85dec43511d362a4f3625b22729abbed0cbf3a32ba250b18e887535f2686a2026b32122776cf5435efd95396e3023fa

  • SSDEEP

    24576:TG4N0uzw3OvrnKuzTBZzPVT8EhMykjeSnqhXx4QbUIx1/3a+t9rGsWapUf99VVx:dN0N3ODrB5dIPykjehxhUIx1/q+tZVkX

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p1nr

Decoy

daas.contractors

cabanatvs.com

jinlowe.com

onbtwy.space

successportal.net

lodolamacze.info

thesilveralchemist.com

honobono-kobo.com

comouv.com

coyotecastbullets.com

pwotech.com

lakebernardcottages.com

sportsparadise365.com

chuyentrasauvietelonline.club

ncambiental.com

persiantrips.travel

binomo-market.website

girls-ish.com

yuzurin777.com

viaronsport.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe
    "C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:2692
    • C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe
      "C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2840

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2692-13-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-24-0x0000000000110000-0x0000000000157000-memory.dmp

    Filesize

    284KB

  • memory/2692-4-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-6-0x0000000000110000-0x0000000000157000-memory.dmp

    Filesize

    284KB

  • memory/2692-9-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-8-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-7-0x00000000000F0000-0x00000000000F1000-memory.dmp

    Filesize

    4KB

  • memory/2692-5-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-3-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-10-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-11-0x0000000001011000-0x000000000125D000-memory.dmp

    Filesize

    2.3MB

  • memory/2692-2-0x0000000001011000-0x000000000125D000-memory.dmp

    Filesize

    2.3MB

  • memory/2692-15-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-14-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-0-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-16-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-18-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-17-0x000000000E400000-0x000000000FE54000-memory.dmp

    Filesize

    26.3MB

  • memory/2692-21-0x000000000E400000-0x000000000E935000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-12-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2692-25-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2840-19-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2840-23-0x0000000001010000-0x0000000001545000-memory.dmp

    Filesize

    5.2MB

  • memory/2840-22-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB