Analysis

  • max time kernel
    100s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:19

General

  • Target

    4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe

  • Size

    1.1MB

  • MD5

    3702c5efbf064afe0436e61bc355ca94

  • SHA1

    5760a5ed8d7d0b30e1c06530df6c6ef5a44de572

  • SHA256

    4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897

  • SHA512

    4d7e47565d3c9ceff0ec1ba1e7ae56abf85dec43511d362a4f3625b22729abbed0cbf3a32ba250b18e887535f2686a2026b32122776cf5435efd95396e3023fa

  • SSDEEP

    24576:TG4N0uzw3OvrnKuzTBZzPVT8EhMykjeSnqhXx4QbUIx1/3a+t9rGsWapUf99VVx:dN0N3ODrB5dIPykjehxhUIx1/q+tZVkX

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p1nr

Decoy

daas.contractors

cabanatvs.com

jinlowe.com

onbtwy.space

successportal.net

lodolamacze.info

thesilveralchemist.com

honobono-kobo.com

comouv.com

coyotecastbullets.com

pwotech.com

lakebernardcottages.com

sportsparadise365.com

chuyentrasauvietelonline.club

ncambiental.com

persiantrips.travel

binomo-market.website

girls-ish.com

yuzurin777.com

viaronsport.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe
    "C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe
      "C:\Users\Admin\AppData\Local\Temp\4e084eb594dca69ba8ac628aa74dbe43fe6032a71f47785241f72e1a52dff897.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2276

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1696-12-0x00000000034D0000-0x0000000003517000-memory.dmp

    Filesize

    284KB

  • memory/1696-5-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-0-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-3-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-13-0x0000000000F41000-0x000000000118D000-memory.dmp

    Filesize

    2.3MB

  • memory/1696-7-0x00000000034D0000-0x0000000003517000-memory.dmp

    Filesize

    284KB

  • memory/1696-8-0x00000000034B0000-0x00000000034B1000-memory.dmp

    Filesize

    4KB

  • memory/1696-14-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-4-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-9-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-10-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-11-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-2-0x0000000000F41000-0x000000000118D000-memory.dmp

    Filesize

    2.3MB

  • memory/1696-1-0x00000000034D0000-0x0000000003517000-memory.dmp

    Filesize

    284KB

  • memory/1696-6-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-15-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-17-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-16-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-18-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-19-0x0000000011FF0000-0x0000000013A44000-memory.dmp

    Filesize

    26.3MB

  • memory/1696-21-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-26-0x0000000000F40000-0x0000000001475000-memory.dmp

    Filesize

    5.2MB

  • memory/1696-25-0x00000000034D0000-0x0000000003517000-memory.dmp

    Filesize

    284KB

  • memory/2276-24-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2276-22-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB