Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:21

General

  • Target

    588395RQ9484481001088.exe

  • Size

    435KB

  • MD5

    5c4f900c98ae6bc1a60989ff945518cf

  • SHA1

    512810a254405e9250dec9036293904ec37ac86f

  • SHA256

    08302b5e5672ba31f714c6ff192a0abb07fabedc63fb1fe256a3ec4ac5512818

  • SHA512

    8606005882accae561c729268bd82f57a0c1006d6c925ead479d69aa3cda191bd6bb32e2bf66c3cc431bb29dd4c61d0f9cb71febe7bb4c20377e6be7df12d00f

  • SSDEEP

    6144:Y4vXf2uStjUqgJqjpdKJJWJtJwkzJslW0Eu+7WSOmycqEbMRXqrQ:yjULJqjpEJmUkOQ0t+aSO+MRXQQ

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

w240

Decoy

deathgummys.com

accentuable.info

logisticairpetrelocators.com

playdropmats.com

ewshop.club

bislists.com

pkkjoo.net

goldenkaktus.com

bigspiderproductions.com

funessences.com

gimpydogproductions.com

motivatedmarketinggroup.com

bjadd.com

2ux3ms.com

zafzi.com

oldmanemailplan.xyz

quotexlibya.com

mobco.store

stofferogbo.kim

akidsguidetotheworld.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3528
    • C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe
      "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe
        "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2052
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\588395RQ9484481001088.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1472-13-0x0000000074ED0000-0x0000000075680000-memory.dmp

    Filesize

    7.7MB

  • memory/1472-7-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/1472-2-0x0000000005310000-0x00000000058B4000-memory.dmp

    Filesize

    5.6MB

  • memory/1472-3-0x0000000004D60000-0x0000000004DF2000-memory.dmp

    Filesize

    584KB

  • memory/1472-4-0x0000000074ED0000-0x0000000075680000-memory.dmp

    Filesize

    7.7MB

  • memory/1472-5-0x0000000004EF0000-0x0000000004EFA000-memory.dmp

    Filesize

    40KB

  • memory/1472-6-0x0000000005300000-0x000000000530C000-memory.dmp

    Filesize

    48KB

  • memory/1472-0-0x0000000074EDE000-0x0000000074EDF000-memory.dmp

    Filesize

    4KB

  • memory/1472-8-0x0000000074ED0000-0x0000000075680000-memory.dmp

    Filesize

    7.7MB

  • memory/1472-9-0x00000000063D0000-0x000000000646C000-memory.dmp

    Filesize

    624KB

  • memory/1472-10-0x0000000006470000-0x00000000064C2000-memory.dmp

    Filesize

    328KB

  • memory/1472-1-0x0000000000300000-0x0000000000374000-memory.dmp

    Filesize

    464KB

  • memory/2052-17-0x00000000016E0000-0x00000000016F1000-memory.dmp

    Filesize

    68KB

  • memory/2052-14-0x00000000017C0000-0x0000000001B0A000-memory.dmp

    Filesize

    3.3MB

  • memory/2052-11-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2052-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3528-26-0x0000000003220000-0x00000000032EF000-memory.dmp

    Filesize

    828KB

  • memory/3528-22-0x0000000002CA0000-0x0000000002D99000-memory.dmp

    Filesize

    996KB

  • memory/3528-18-0x0000000002CA0000-0x0000000002D99000-memory.dmp

    Filesize

    996KB

  • memory/3528-27-0x0000000003220000-0x00000000032EF000-memory.dmp

    Filesize

    828KB

  • memory/3528-29-0x0000000003220000-0x00000000032EF000-memory.dmp

    Filesize

    828KB

  • memory/3648-19-0x0000000000B30000-0x0000000000B36000-memory.dmp

    Filesize

    24KB

  • memory/3648-20-0x0000000000B30000-0x0000000000B36000-memory.dmp

    Filesize

    24KB

  • memory/3648-21-0x0000000000A00000-0x0000000000A29000-memory.dmp

    Filesize

    164KB