Analysis

  • max time kernel
    149s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/11/2024, 19:58

General

  • Target

    Scanned Enquires.exe

  • Size

    1.1MB

  • MD5

    9abd9b9521e406af49f9fb0e565d213f

  • SHA1

    aea9b4c2dec2895be98fd9f4e10aac40df711879

  • SHA256

    6771c3c843a0128509585cf697d7c466ae15c3c586789fdd3d7928328e0236c0

  • SHA512

    f0a8255cdd0ae4ec56ea2bb5cb48736e6935a2761ccb98d30bb5cb9db5bf931c4f93e9f79b7321eaf899e5b3cf4507a8febba8a953b4ccd91ab4b06087386b90

  • SSDEEP

    12288:F8/tsfA+hiNmT0tBBWX/BVhu1cDb9AgNP+bKWTAivJrYjM5XxmCyW+F3fJJCFuZC:FitqA+hi86zep0kOa+HlOjmmCyzBJC

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

meub

Decoy

ebookcu.com

sherwooddaydesigns.com

healthcarebb.com

pixelflydesigns.com

youtegou.net

audiokeychin.com

rioranchoeventscenter.com

nickofolas.com

comicstattoosnguns.com

ally.tech

paperplaneexplorer.com

janetkk.com

sun1981.com

pocopage.com

shortagegoal.com

tbluelinux.com

servantsheartvalet.com

jkhushal.com

91huangyu.com

portlandconservatory.net

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3368
    • C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe
      "C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:4724
      • C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe
        "C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1204
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:4276
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:4292
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:3760
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:652
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:5092
              • C:\Windows\SysWOW64\svchost.exe
                "C:\Windows\SysWOW64\svchost.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • System Location Discovery: System Language Discovery
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2108
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Users\Admin\AppData\Local\Temp\Scanned Enquires.exe"
                  3⤵
                  • System Location Discovery: System Language Discovery
                  PID:1740

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1204-16-0x0000000000FC0000-0x000000000130A000-memory.dmp

              Filesize

              3.3MB

            • memory/1204-19-0x0000000000F50000-0x0000000000F61000-memory.dmp

              Filesize

              68KB

            • memory/1204-13-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/1204-18-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/1204-23-0x0000000001410000-0x0000000001421000-memory.dmp

              Filesize

              68KB

            • memory/1204-22-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/2108-28-0x0000000000750000-0x000000000075E000-memory.dmp

              Filesize

              56KB

            • memory/2108-26-0x0000000000750000-0x000000000075E000-memory.dmp

              Filesize

              56KB

            • memory/2108-29-0x0000000000C10000-0x0000000000C39000-memory.dmp

              Filesize

              164KB

            • memory/3368-25-0x0000000002680000-0x000000000277E000-memory.dmp

              Filesize

              1016KB

            • memory/3368-24-0x00000000028E0000-0x0000000002A36000-memory.dmp

              Filesize

              1.3MB

            • memory/3368-20-0x0000000002680000-0x000000000277E000-memory.dmp

              Filesize

              1016KB

            • memory/3368-30-0x00000000028E0000-0x0000000002A36000-memory.dmp

              Filesize

              1.3MB

            • memory/3368-33-0x0000000007070000-0x0000000007140000-memory.dmp

              Filesize

              832KB

            • memory/3368-35-0x0000000007070000-0x0000000007140000-memory.dmp

              Filesize

              832KB

            • memory/4724-7-0x00000000073D0000-0x0000000007426000-memory.dmp

              Filesize

              344KB

            • memory/4724-15-0x0000000074CA0000-0x0000000075450000-memory.dmp

              Filesize

              7.7MB

            • memory/4724-12-0x0000000000D20000-0x0000000000DA6000-memory.dmp

              Filesize

              536KB

            • memory/4724-11-0x0000000000AC0000-0x0000000000B8C000-memory.dmp

              Filesize

              816KB

            • memory/4724-10-0x0000000074CA0000-0x0000000075450000-memory.dmp

              Filesize

              7.7MB

            • memory/4724-9-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

              Filesize

              4KB

            • memory/4724-8-0x0000000007590000-0x000000000759A000-memory.dmp

              Filesize

              40KB

            • memory/4724-0-0x0000000074CAE000-0x0000000074CAF000-memory.dmp

              Filesize

              4KB

            • memory/4724-6-0x0000000074CA0000-0x0000000075450000-memory.dmp

              Filesize

              7.7MB

            • memory/4724-5-0x0000000000CD0000-0x0000000000CDA000-memory.dmp

              Filesize

              40KB

            • memory/4724-4-0x0000000007240000-0x00000000072D2000-memory.dmp

              Filesize

              584KB

            • memory/4724-3-0x0000000007750000-0x0000000007CF4000-memory.dmp

              Filesize

              5.6MB

            • memory/4724-2-0x0000000007100000-0x000000000719C000-memory.dmp

              Filesize

              624KB

            • memory/4724-1-0x00000000001A0000-0x00000000002BA000-memory.dmp

              Filesize

              1.1MB