Analysis

  • max time kernel
    117s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 19:58

General

  • Target

    Scanned Enquires.exe

  • Size

    1.1MB

  • MD5

    9abd9b9521e406af49f9fb0e565d213f

  • SHA1

    aea9b4c2dec2895be98fd9f4e10aac40df711879

  • SHA256

    6771c3c843a0128509585cf697d7c466ae15c3c586789fdd3d7928328e0236c0

  • SHA512

    f0a8255cdd0ae4ec56ea2bb5cb48736e6935a2761ccb98d30bb5cb9db5bf931c4f93e9f79b7321eaf899e5b3cf4507a8febba8a953b4ccd91ab4b06087386b90

  • SSDEEP

    12288:F8/tsfA+hiNmT0tBBWX/BVhu1cDb9AgNP+bKWTAivJrYjM5XxmCyW+F3fJJCFuZC:FitqA+hi86zep0kOa+HlOjmmCyzBJC

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

meub

Decoy

ebookcu.com

sherwooddaydesigns.com

healthcarebb.com

pixelflydesigns.com

youtegou.net

audiokeychin.com

rioranchoeventscenter.com

nickofolas.com

comicstattoosnguns.com

ally.tech

paperplaneexplorer.com

janetkk.com

sun1981.com

pocopage.com

shortagegoal.com

tbluelinux.com

servantsheartvalet.com

jkhushal.com

91huangyu.com

portlandconservatory.net

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe
      "C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2604
      • C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe
        "C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:568
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 268
        3⤵
        • Program crash
        PID:2736

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/568-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/568-17-0x00000000008D0000-0x0000000000BD3000-memory.dmp

    Filesize

    3.0MB

  • memory/568-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/568-23-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/568-10-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/568-24-0x00000000003A0000-0x00000000003B1000-memory.dmp

    Filesize

    68KB

  • memory/568-20-0x0000000000140000-0x0000000000151000-memory.dmp

    Filesize

    68KB

  • memory/568-19-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/568-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/772-27-0x0000000000080000-0x0000000000094000-memory.dmp

    Filesize

    80KB

  • memory/772-28-0x0000000000080000-0x0000000000094000-memory.dmp

    Filesize

    80KB

  • memory/772-30-0x0000000000080000-0x0000000000094000-memory.dmp

    Filesize

    80KB

  • memory/1232-26-0x0000000004630000-0x00000000046EF000-memory.dmp

    Filesize

    764KB

  • memory/1232-21-0x0000000004E00000-0x0000000004F65000-memory.dmp

    Filesize

    1.4MB

  • memory/1232-25-0x0000000004E00000-0x0000000004F65000-memory.dmp

    Filesize

    1.4MB

  • memory/2604-6-0x00000000048B0000-0x000000000497C000-memory.dmp

    Filesize

    816KB

  • memory/2604-16-0x00000000743F0000-0x0000000074ADE000-memory.dmp

    Filesize

    6.9MB

  • memory/2604-7-0x0000000007100000-0x0000000007186000-memory.dmp

    Filesize

    536KB

  • memory/2604-0-0x00000000743FE000-0x00000000743FF000-memory.dmp

    Filesize

    4KB

  • memory/2604-5-0x00000000743F0000-0x0000000074ADE000-memory.dmp

    Filesize

    6.9MB

  • memory/2604-4-0x00000000743FE000-0x00000000743FF000-memory.dmp

    Filesize

    4KB

  • memory/2604-3-0x00000000743F0000-0x0000000074ADE000-memory.dmp

    Filesize

    6.9MB

  • memory/2604-2-0x00000000006A0000-0x00000000006AA000-memory.dmp

    Filesize

    40KB

  • memory/2604-1-0x0000000000E00000-0x0000000000F1A000-memory.dmp

    Filesize

    1.1MB