Analysis

  • max time kernel
    149s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 19:54

General

  • Target

    Rfq_order_item_24062021.exe

  • Size

    395KB

  • MD5

    3914d904ebe3174fbfa604d97cae3a70

  • SHA1

    8f175b52d4c770821af2d15dc0913e721316ad08

  • SHA256

    d210db96dc90cbfc39b183fbab1bb9f59bd321101fbc7c405a1a4c16e0033863

  • SHA512

    11dc78ad2a8c127c9b26d59a20ec5a4fafe22c364b828ab351e9c3255eb667ac9bfcb43a69f23713456204c1ae99db93fcbc858a9e0f7d114b1a337aca4d78b3

  • SSDEEP

    6144:RTqjFta/eo1NGZxvk4QumnHU3lg3Z2hHmZIN38hkOQ7iZx7:5aaG4GZxvVbg3sHhNs+J7iZx7

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

rht3

Decoy

sincitytactical.xyz

danangclick.com

walaupulaupau07.com

caselnk.com

abcnwqs.com

lordlinghk.com

unsaltner.com

allocationtestdrive.com

directinteractionscorp.com

paloaltoroofing.info

limchinjoosawmill.com

planetafps.com

elevenstonestudios.com

dqaej.com

generilic.com

sandydigitalmarketing.com

flyingnorthdesigns.com

arrowmops.com

freedommindsetpod.com

fpr.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1160
    • C:\Users\Admin\AppData\Local\Temp\Rfq_order_item_24062021.exe
      "C:\Users\Admin\AppData\Local\Temp\Rfq_order_item_24062021.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\Rfq_order_item_24062021.exe
        "C:\Users\Admin\AppData\Local\Temp\Rfq_order_item_24062021.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2556
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Rfq_order_item_24062021.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsy4F4A.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • memory/1160-15-0x0000000004C90000-0x0000000004D63000-memory.dmp

    Filesize

    844KB

  • memory/1160-18-0x0000000004C90000-0x0000000004D63000-memory.dmp

    Filesize

    844KB

  • memory/1160-19-0x0000000006580000-0x0000000006724000-memory.dmp

    Filesize

    1.6MB

  • memory/1160-27-0x0000000006580000-0x0000000006724000-memory.dmp

    Filesize

    1.6MB

  • memory/2556-12-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2556-14-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2556-17-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/2860-23-0x0000000000D00000-0x0000000000D0E000-memory.dmp

    Filesize

    56KB

  • memory/2860-22-0x0000000000D00000-0x0000000000D0E000-memory.dmp

    Filesize

    56KB

  • memory/2860-25-0x0000000000D00000-0x0000000000D0E000-memory.dmp

    Filesize

    56KB

  • memory/2860-26-0x0000000000090000-0x00000000000B8000-memory.dmp

    Filesize

    160KB