Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:29

General

  • Target

    TNT Documents.exe

  • Size

    437KB

  • MD5

    b645c00f43011c6c544de85252898b5a

  • SHA1

    e56e43d323e9c6e65c5909b8961d81453fca53fa

  • SHA256

    a23066484dc83fa51ab36d9dc530799662abf63c7a12ed9cc10acc272e0c14f6

  • SHA512

    d9bde87b1d28b37db66a40bfa1a6e765a2dcbe2b23e6034fe1bacf56cbf9d38ccdecec3fcfdd50230d547f1334f038293129f000f42b8ec7f3b2bbaca53400d4

  • SSDEEP

    6144:zqwpecjP4vnTNSqMkRwkfIHd/rCPxiPGs25jwtTGOuBdkE4jcZOit7k7YwifsF/0:jpAP8kw7/I7s2JHTBUpiovifshFG

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

how6

Decoy

wealthcabana.com

fourfortyfourcreations.com

cqqcsy.com

bhwzjd.com

niftyfashionrewards.com

andersongiftemporium.com

smarttradingcoin.com

ilarealty.com

sherrywine.net

fsecg.info

xoti.top

pirosconsulting.com

fundapie.com

bbgm4egda.xyz

legalfortmyers.com

improvizy.com

yxdyhs.com

lucky2balls.com

panelmall.com

davenportkartway.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3504
    • C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe
      "C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4556
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3672
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\TNT Documents.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1596

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3080-1-0x0000000074630000-0x0000000074BE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-2-0x0000000074630000-0x0000000074BE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-3-0x0000000074632000-0x0000000074633000-memory.dmp

    Filesize

    4KB

  • memory/3080-4-0x0000000074630000-0x0000000074BE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-7-0x0000000074630000-0x0000000074BE1000-memory.dmp

    Filesize

    5.7MB

  • memory/3080-0-0x0000000074632000-0x0000000074633000-memory.dmp

    Filesize

    4KB

  • memory/3504-12-0x00000000027D0000-0x00000000028B7000-memory.dmp

    Filesize

    924KB

  • memory/3504-23-0x0000000002C70000-0x0000000002D25000-memory.dmp

    Filesize

    724KB

  • memory/3504-21-0x0000000002C70000-0x0000000002D25000-memory.dmp

    Filesize

    724KB

  • memory/3504-17-0x00000000027D0000-0x00000000028B7000-memory.dmp

    Filesize

    924KB

  • memory/3672-15-0x0000000000060000-0x0000000000074000-memory.dmp

    Filesize

    80KB

  • memory/3672-13-0x0000000000060000-0x0000000000074000-memory.dmp

    Filesize

    80KB

  • memory/3672-16-0x0000000000980000-0x00000000009A9000-memory.dmp

    Filesize

    164KB

  • memory/4556-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/4556-11-0x0000000000FB0000-0x0000000000FC1000-memory.dmp

    Filesize

    68KB

  • memory/4556-8-0x0000000001120000-0x000000000146A000-memory.dmp

    Filesize

    3.3MB

  • memory/4556-5-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB