Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:26

General

  • Target

    48ebad81d92ce98fba777a39a5a78ea05ba60b3d58bd36eac52bd95af71143dd.exe

  • Size

    872KB

  • MD5

    fd724406b255a493f330ee2770c4ac9a

  • SHA1

    860e185a6d5c43181e57d09696d317c511caf3a5

  • SHA256

    48ebad81d92ce98fba777a39a5a78ea05ba60b3d58bd36eac52bd95af71143dd

  • SHA512

    6e23dbdbc2f22d77ed811e67a9008eff395fd23d198a585e71dd193cff7cfefd0ad7edfa11de0b5781d0b6cb6dcbacac47ef39547f949dc882d16f81770d1cb3

  • SSDEEP

    12288:dDFEOEhGkEHIxZEfzfYNM9a462lRbSRiLIsBOgkrBZGR/Qp/vSBR7sXTQiuD/6he:egVOEjqCkov8sBOBlgQRkd4wJ

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ahge

Decoy

zlh.biz

suddennnnnnnnnnnn11.xyz

okanliving.com

shopeuphoricapparel.com

hcifo.com

haciendalosangeleslaguna.com

shineshaft.online

monclerjacketsusa.biz

uwuplay.com

psychicdeb.com

adonlet.com

theprogressivehomesteaders.com

ammaninstitute.com

sqpod.com

tropicbaywatergardens.net

yna901.net

3christinez.online

tastemon.com

karansabberwal.com

delegif.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3488
    • C:\Users\Admin\AppData\Local\Temp\48ebad81d92ce98fba777a39a5a78ea05ba60b3d58bd36eac52bd95af71143dd.exe
      "C:\Users\Admin\AppData\Local\Temp\48ebad81d92ce98fba777a39a5a78ea05ba60b3d58bd36eac52bd95af71143dd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2064
      • C:\Windows\SysWOW64\msfeedssync.exe
        "C:\Windows\SysWOW64\msfeedssync.exe"
        3⤵
          PID:2992
        • C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe
          "C:\Windows\SysWOW64\SystemPropertiesDataExecutionPrevention.exe"
          3⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:3720
        • C:\Windows\SysWOW64\wscadminui.exe
          "C:\Windows\SysWOW64\wscadminui.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:396
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4828
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\SysWOW64\wscadminui.exe"
          3⤵
          • System Location Discovery: System Language Discovery
          PID:2728

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/396-14-0x0000000000B20000-0x0000000000B31000-memory.dmp

      Filesize

      68KB

    • memory/396-13-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/396-11-0x0000000000D80000-0x00000000010CA000-memory.dmp

      Filesize

      3.3MB

    • memory/2064-6-0x0000000005290000-0x00000000052A6000-memory.dmp

      Filesize

      88KB

    • memory/2064-4-0x00000000053B0000-0x000000000544C000-memory.dmp

      Filesize

      624KB

    • memory/2064-5-0x0000000005460000-0x000000000551A000-memory.dmp

      Filesize

      744KB

    • memory/2064-3-0x0000000005310000-0x00000000053A2000-memory.dmp

      Filesize

      584KB

    • memory/2064-7-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/2064-19-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/2064-17-0x00000000744A0000-0x0000000074C50000-memory.dmp

      Filesize

      7.7MB

    • memory/2064-2-0x00000000058C0000-0x0000000005E64000-memory.dmp

      Filesize

      5.6MB

    • memory/2064-1-0x0000000000970000-0x0000000000A50000-memory.dmp

      Filesize

      896KB

    • memory/2064-0-0x00000000744AE000-0x00000000744AF000-memory.dmp

      Filesize

      4KB

    • memory/2064-15-0x00000000744AE000-0x00000000744AF000-memory.dmp

      Filesize

      4KB

    • memory/3488-16-0x0000000003130000-0x0000000003243000-memory.dmp

      Filesize

      1.1MB

    • memory/3488-23-0x0000000003130000-0x0000000003243000-memory.dmp

      Filesize

      1.1MB

    • memory/3488-26-0x0000000008610000-0x0000000008747000-memory.dmp

      Filesize

      1.2MB

    • memory/3488-28-0x0000000008610000-0x0000000008747000-memory.dmp

      Filesize

      1.2MB

    • memory/3488-29-0x0000000008610000-0x0000000008747000-memory.dmp

      Filesize

      1.2MB

    • memory/3720-9-0x0000000000FC0000-0x000000000130A000-memory.dmp

      Filesize

      3.3MB

    • memory/3720-8-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/4828-21-0x0000000000BA0000-0x0000000000BAC000-memory.dmp

      Filesize

      48KB

    • memory/4828-20-0x0000000000BA0000-0x0000000000BAC000-memory.dmp

      Filesize

      48KB

    • memory/4828-22-0x0000000000E40000-0x0000000000E69000-memory.dmp

      Filesize

      164KB