Analysis

  • max time kernel
    148s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 19:51

General

  • Target

    PO_006614.doc.exe

  • Size

    1.3MB

  • MD5

    07e55585280a090c5be065456bd3eaed

  • SHA1

    142c3b752b1791b6d8eb7b8fb78f36773a51d808

  • SHA256

    428e45ab1e675cd53981edd68a9d7989a78b267e069a8ce64415c5788c012212

  • SHA512

    b9a8cde0da7a47f7242bf26f45a54820520b2469534caff639313a05a837ff16bdea1d206765a622c10cf5dc740c3be5107dd4bc2b6d1bd6f17aba007f90de87

  • SSDEEP

    24576:RIjY+bAaMd3REebAaMd33zBNxFUVpkmkFFogHBa8+Gefg/kz:O5AaMVRE2AaMV3zBCLAFoOBa8+Gefg

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

rbg8

Decoy

youschrutedit.com

ashvarapps.com

lover4fun.com

xn--hvsa952mrp8a.com

gentryrewards.com

musfly.info

greatexpectationssouthshore.com

thebluecreators.com

chargementale.com

construirsanidade.com

asiannics.icu

cacchaweb.xyz

retailfully.com

mktdigitalplus.com

ohiohemorrhoidcenter.com

tzbwgc.com

representmasks.com

integratedpsychedelics.net

okrvsale.com

cashflowplatformblueprint.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3428
      • C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe
        "C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe
          "C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3376
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2084
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\PO_006614.doc.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:1640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1680-15-0x0000000074CA0000-0x0000000075450000-memory.dmp

      Filesize

      7.7MB

    • memory/1680-2-0x0000000005690000-0x000000000572C000-memory.dmp

      Filesize

      624KB

    • memory/1680-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

      Filesize

      4KB

    • memory/1680-3-0x0000000005CE0000-0x0000000006284000-memory.dmp

      Filesize

      5.6MB

    • memory/1680-4-0x00000000057D0000-0x0000000005862000-memory.dmp

      Filesize

      584KB

    • memory/1680-5-0x0000000005770000-0x000000000577A000-memory.dmp

      Filesize

      40KB

    • memory/1680-6-0x00000000059D0000-0x0000000005A26000-memory.dmp

      Filesize

      344KB

    • memory/1680-7-0x0000000074CA0000-0x0000000075450000-memory.dmp

      Filesize

      7.7MB

    • memory/1680-8-0x00000000059C0000-0x00000000059D6000-memory.dmp

      Filesize

      88KB

    • memory/1680-9-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

      Filesize

      4KB

    • memory/1680-10-0x0000000074CA0000-0x0000000075450000-memory.dmp

      Filesize

      7.7MB

    • memory/1680-11-0x0000000006800000-0x0000000006880000-memory.dmp

      Filesize

      512KB

    • memory/1680-12-0x0000000008DA0000-0x0000000008DE2000-memory.dmp

      Filesize

      264KB

    • memory/1680-1-0x0000000000B80000-0x0000000000CDE000-memory.dmp

      Filesize

      1.4MB

    • memory/2084-28-0x00000000008C0000-0x00000000008DE000-memory.dmp

      Filesize

      120KB

    • memory/2084-30-0x0000000001000000-0x0000000001029000-memory.dmp

      Filesize

      164KB

    • memory/2084-26-0x00000000008C0000-0x00000000008DE000-memory.dmp

      Filesize

      120KB

    • memory/3376-18-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3376-22-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3376-13-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3376-23-0x0000000003410000-0x0000000003420000-memory.dmp

      Filesize

      64KB

    • memory/3376-19-0x00000000015C0000-0x00000000015D0000-memory.dmp

      Filesize

      64KB

    • memory/3376-16-0x00000000016F0000-0x0000000001A3A000-memory.dmp

      Filesize

      3.3MB

    • memory/3428-36-0x0000000002C30000-0x0000000002CDA000-memory.dmp

      Filesize

      680KB

    • memory/3428-25-0x0000000002B60000-0x0000000002C2A000-memory.dmp

      Filesize

      808KB

    • memory/3428-20-0x0000000002B60000-0x0000000002C2A000-memory.dmp

      Filesize

      808KB

    • memory/3428-29-0x0000000008850000-0x0000000008964000-memory.dmp

      Filesize

      1.1MB

    • memory/3428-24-0x0000000008850000-0x0000000008964000-memory.dmp

      Filesize

      1.1MB

    • memory/3428-33-0x0000000002C30000-0x0000000002CDA000-memory.dmp

      Filesize

      680KB

    • memory/3428-34-0x0000000002C30000-0x0000000002CDA000-memory.dmp

      Filesize

      680KB