Analysis

  • max time kernel
    150s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:21

General

  • Target

    588395RQ9484481001088.exe

  • Size

    435KB

  • MD5

    5c4f900c98ae6bc1a60989ff945518cf

  • SHA1

    512810a254405e9250dec9036293904ec37ac86f

  • SHA256

    08302b5e5672ba31f714c6ff192a0abb07fabedc63fb1fe256a3ec4ac5512818

  • SHA512

    8606005882accae561c729268bd82f57a0c1006d6c925ead479d69aa3cda191bd6bb32e2bf66c3cc431bb29dd4c61d0f9cb71febe7bb4c20377e6be7df12d00f

  • SSDEEP

    6144:Y4vXf2uStjUqgJqjpdKJJWJtJwkzJslW0Eu+7WSOmycqEbMRXqrQ:yjULJqjpEJmUkOQ0t+aSO+MRXQQ

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

w240

Decoy

deathgummys.com

accentuable.info

logisticairpetrelocators.com

playdropmats.com

ewshop.club

bislists.com

pkkjoo.net

goldenkaktus.com

bigspiderproductions.com

funessences.com

gimpydogproductions.com

motivatedmarketinggroup.com

bjadd.com

2ux3ms.com

zafzi.com

oldmanemailplan.xyz

quotexlibya.com

mobco.store

stofferogbo.kim

akidsguidetotheworld.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe
      "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1548
      • C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe
        "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
        3⤵
          PID:2652
        • C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe
          "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2576
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2580
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
          3⤵
          • Deletes itself
          • System Location Discovery: System Language Discovery
          PID:2464

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1184-19-0x0000000005100000-0x0000000005201000-memory.dmp

      Filesize

      1.0MB

    • memory/1184-23-0x0000000005100000-0x0000000005201000-memory.dmp

      Filesize

      1.0MB

    • memory/1548-5-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/1548-2-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/1548-4-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

      Filesize

      4KB

    • memory/1548-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

      Filesize

      4KB

    • memory/1548-6-0x0000000004350000-0x00000000043A2000-memory.dmp

      Filesize

      328KB

    • memory/1548-1-0x0000000000310000-0x0000000000384000-memory.dmp

      Filesize

      464KB

    • memory/1548-3-0x00000000006D0000-0x00000000006DC000-memory.dmp

      Filesize

      48KB

    • memory/1548-14-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2576-11-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2576-13-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2576-15-0x0000000000930000-0x0000000000C33000-memory.dmp

      Filesize

      3.0MB

    • memory/2576-18-0x0000000000280000-0x0000000000291000-memory.dmp

      Filesize

      68KB

    • memory/2576-17-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2576-9-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2576-7-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/2580-20-0x0000000000CA0000-0x0000000000F21000-memory.dmp

      Filesize

      2.5MB

    • memory/2580-21-0x0000000000CA0000-0x0000000000F21000-memory.dmp

      Filesize

      2.5MB

    • memory/2580-22-0x0000000000080000-0x00000000000A9000-memory.dmp

      Filesize

      164KB