Analysis

  • max time kernel
    146s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:29

General

  • Target

    po.exe

  • Size

    968KB

  • MD5

    7c8206e11a3f0a3832c65ee22ca21819

  • SHA1

    fb255b2ee75cc76180daddb78c7cf912eb248f06

  • SHA256

    f8cdb91e57d80dd935b4490720b39d75db0443fac602c9d4cdab434aa82a6a43

  • SHA512

    b230d0ebeddb1641a2f63286b8d90d7f7d83b03f5cec4d7433e8463dc22796c9bf657bb487ab7f57221173cd42721b27289dc2e7f8f9817fcd3f6a6968c5bca2

  • SSDEEP

    24576:AyCb02+HEYq7j15AD9UvCVPA/012j1DkdZ:px3HZqdcUS2Jkd

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

i9me

Decoy

claimbrosprospecting.com

visionnaire.design

russmatsuo.com

phpower.com

themaitregroup.net

perderson.space

signaturewallcoverings.com

mesharifoundation.com

mastjio.com

ngstarshub.com

teamsdialpad.com

handysyed.com

basalgoods.company

miniletics.com

reidasmaquinasdolitoral.com

signsgadsden.com

huigukeji.net

yesonmeasurez.com

rwingbistro.com

xn--90aoahqe0a0f.xn--p1acf

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3428
    • C:\Users\Admin\AppData\Local\Temp\po.exe
      "C:\Users\Admin\AppData\Local\Temp\po.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3252
      • C:\Users\Admin\AppData\Local\Temp\po.exe
        "C:\Users\Admin\AppData\Local\Temp\po.exe"
        3⤵
          PID:5072
        • C:\Users\Admin\AppData\Local\Temp\po.exe
          "C:\Users\Admin\AppData\Local\Temp\po.exe"
          3⤵
            PID:3024
          • C:\Users\Admin\AppData\Local\Temp\po.exe
            "C:\Users\Admin\AppData\Local\Temp\po.exe"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:876
        • C:\Windows\SysWOW64\wscript.exe
          "C:\Windows\SysWOW64\wscript.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1840
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\po.exe"
            3⤵
            • System Location Discovery: System Language Discovery
            PID:4352

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/876-13-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/876-18-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/876-19-0x0000000001040000-0x0000000001050000-memory.dmp

        Filesize

        64KB

      • memory/876-16-0x0000000001640000-0x000000000198A000-memory.dmp

        Filesize

        3.3MB

      • memory/1840-23-0x0000000000800000-0x0000000000828000-memory.dmp

        Filesize

        160KB

      • memory/1840-22-0x0000000000940000-0x0000000000967000-memory.dmp

        Filesize

        156KB

      • memory/1840-21-0x0000000000940000-0x0000000000967000-memory.dmp

        Filesize

        156KB

      • memory/3252-6-0x0000000005650000-0x00000000056A6000-memory.dmp

        Filesize

        344KB

      • memory/3252-2-0x0000000005360000-0x00000000053FC000-memory.dmp

        Filesize

        624KB

      • memory/3252-9-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

        Filesize

        4KB

      • memory/3252-10-0x0000000074CA0000-0x0000000075450000-memory.dmp

        Filesize

        7.7MB

      • memory/3252-11-0x0000000006CE0000-0x0000000006D9A000-memory.dmp

        Filesize

        744KB

      • memory/3252-12-0x00000000011B0000-0x0000000001228000-memory.dmp

        Filesize

        480KB

      • memory/3252-7-0x0000000074CA0000-0x0000000075450000-memory.dmp

        Filesize

        7.7MB

      • memory/3252-15-0x0000000074CA0000-0x0000000075450000-memory.dmp

        Filesize

        7.7MB

      • memory/3252-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

        Filesize

        4KB

      • memory/3252-1-0x00000000008A0000-0x0000000000998000-memory.dmp

        Filesize

        992KB

      • memory/3252-5-0x0000000005430000-0x000000000543A000-memory.dmp

        Filesize

        40KB

      • memory/3252-4-0x00000000054C0000-0x0000000005552000-memory.dmp

        Filesize

        584KB

      • memory/3252-3-0x00000000059D0000-0x0000000005F74000-memory.dmp

        Filesize

        5.6MB

      • memory/3252-8-0x0000000005800000-0x0000000005814000-memory.dmp

        Filesize

        80KB

      • memory/3428-20-0x0000000002B60000-0x0000000002C8A000-memory.dmp

        Filesize

        1.2MB

      • memory/3428-24-0x0000000002B60000-0x0000000002C8A000-memory.dmp

        Filesize

        1.2MB

      • memory/3428-26-0x0000000008850000-0x0000000008972000-memory.dmp

        Filesize

        1.1MB

      • memory/3428-27-0x0000000008850000-0x0000000008972000-memory.dmp

        Filesize

        1.1MB

      • memory/3428-29-0x0000000008850000-0x0000000008972000-memory.dmp

        Filesize

        1.1MB