Analysis

  • max time kernel
    145s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:22

General

  • Target

    factura y factura de la v_a a_rea.exe

  • Size

    263KB

  • MD5

    8fc1c5f9214f753eda98e00acc7250d1

  • SHA1

    6b1e3b3869227c48aaa4eed2b33505e934f6e890

  • SHA256

    006ce9ab63f0b937fb3966829cbdd801d67c5b0f2b17db3d2f176eee508128ee

  • SHA512

    9ed9a86f5c3b6af00643182fb902ceb523c5d9f20f370efa8f408c5fe114eddaf1f85c79334a8482a65ee9f55ef5d9829cb21935476fa70c60671b575725a64c

  • SSDEEP

    6144:LTqjFeDgN8/bznxiHSRktaCMC4+Bk/R2lqfDELL:/ZgY/XKx4MVljH

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

s4h4

Decoy

v65mwh.com

ofertasempresariais.com

apoteklowamedika.com

shopblvdhair.com

jtcameraftp.com

vimlark.com

wamodo.com

mistersvisuals.com

copterapps.com

jamesebraxton.com

darmarcasepatentes.com

texasroofrepairpros.com

okaycollective.net

rughouzz.com

dgzhileng.com

markstipsandtoes.com

globalgrowlights.com

thehustleandco.com

fdgrenewables.com

sweetsells.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe
      "C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2104
      • C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe
        "C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2984
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2340
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\factura y factura de la v_a a_rea.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2704

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsjC361.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • memory/1192-15-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/1192-16-0x0000000004DD0000-0x0000000004F13000-memory.dmp

    Filesize

    1.3MB

  • memory/1192-22-0x0000000004DD0000-0x0000000004F13000-memory.dmp

    Filesize

    1.3MB

  • memory/2340-20-0x0000000000280000-0x0000000000288000-memory.dmp

    Filesize

    32KB

  • memory/2340-19-0x0000000000280000-0x0000000000288000-memory.dmp

    Filesize

    32KB

  • memory/2340-21-0x00000000000C0000-0x00000000000E9000-memory.dmp

    Filesize

    164KB

  • memory/2984-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2984-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB