Analysis

  • max time kernel
    148s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:25

General

  • Target

    db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86_1648765408695.exe

  • Size

    242KB

  • MD5

    b4536ff04a41cb627463ed157b9c7521

  • SHA1

    db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86

  • SHA256

    144d8b9e77f9c36dbd271d84635cda3eb22b470dbb64e63b1e898041743918fa

  • SHA512

    c963ebfa9fcf119c4eef7f2c17266ce25b0e6e9554dac1da7e7098a7ff2e7af3c07cf70a913f386f2884208394f6035e282d128c59ded256d464b85d8fa549a1

  • SSDEEP

    6144:HNeZmCatx5SFXIcsCbeA79KHt8SCfqlmDwB/NCl:HNlCIx2XIcsrk9uyFwNI

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

hxn2

Decoy

janenoelleneedleworks.com

albedocoin.com

helennbendiss47.xyz

democratizabais.xyz

knellarraywoad.com

vehicleweek.com

cablevid.com

sigmagrup.com

cesarchavezeagles.com

centrocomercialgranadahills.com

theherotea.com

ozarkdemure.com

27mpt.xyz

expansionsound.com

fablebuiltbrands.com

rockyzpizzagyro.com

velociget.com

suntioil4u.com

salvationshippingsecurity.com

spares245.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86_1648765408695.exe
      "C:\Users\Admin\AppData\Local\Temp\db2eaf0d8a8a9f2856d9a9b0cc9ae7c9aaf35c86_1648765408695.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe
        C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe C:\Users\Admin\AppData\Local\Temp\tffxie
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2836
        • C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe
          C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe C:\Users\Admin\AppData\Local\Temp\tffxie
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2616
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2900
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2656

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\d4qtenh7b8kqj9rl

    Filesize

    211KB

    MD5

    94576d95657049b91c279af3fa84b961

    SHA1

    505cbbb2ea39257b67fe7d9f9df976e79819ca32

    SHA256

    e343ef1d1da6e8ac93b500868bdde07c7ba7970b75129c865cc05ef32b1b42e5

    SHA512

    070369ec1da96166039a12355130e135191eff3e0939ae109953954b4e4ba60cb5a918cddd851bb597bdb26b4b430ebc7cd79890250302c7eb882f2b694ddfd0

  • C:\Users\Admin\AppData\Local\Temp\pqnrmmq.exe

    Filesize

    5KB

    MD5

    ffe904bebf87531f8e5214b8b50aa7a9

    SHA1

    7ef3ca140c73dce0c7de875493be90a01e60ec48

    SHA256

    77f25d6adedeeefda3e4d103be5f19f1c227108216565a4d21135d31d5fc9e38

    SHA512

    3091041178650aef9b2bbaeaaf2a43427eb2f17f5d79daf67d8f3d812e7a5f3ad1939b31b5305dba432703d1d634ff9a6401f4cc5a363b8c5762272b24ba2b50

  • C:\Users\Admin\AppData\Local\Temp\tffxie

    Filesize

    7KB

    MD5

    acd719e997b0098acf16b07c01226a5e

    SHA1

    f692b0cd949714f13de60e3288747fe9a8a1d795

    SHA256

    c65e6fd3a6d1addccde72599bbcaa2cda77318e7507a19d9765f8d5514d9d343

    SHA512

    60d686e3262ef47241dbba9b47056ba6db446d3690ac702c78b8e7b4d275c02792470b7394fc3eb999cd924918639f5406e4f9579a5b6be1384c7d550297cea7

  • memory/1196-24-0x00000000064E0000-0x0000000006644000-memory.dmp

    Filesize

    1.4MB

  • memory/1196-20-0x00000000064E0000-0x0000000006644000-memory.dmp

    Filesize

    1.4MB

  • memory/2616-18-0x0000000000140000-0x0000000000151000-memory.dmp

    Filesize

    68KB

  • memory/2616-15-0x0000000000A00000-0x0000000000D03000-memory.dmp

    Filesize

    3.0MB

  • memory/2616-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2616-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2836-8-0x00000000000A0000-0x00000000000A2000-memory.dmp

    Filesize

    8KB

  • memory/2900-22-0x0000000000100000-0x000000000011F000-memory.dmp

    Filesize

    124KB

  • memory/2900-21-0x0000000000100000-0x000000000011F000-memory.dmp

    Filesize

    124KB

  • memory/2900-23-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB