Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 19:57

General

  • Target

    New-Order,pdf.exe

  • Size

    749KB

  • MD5

    aaaf770b9da9ed45ca73b495eb6221ef

  • SHA1

    0031c174a1dcae63a5aa259dde8e3062e17a68bd

  • SHA256

    9ff1a6a0e9326633316aff39f81d9e4a132db16fee4acc1fb25173fbe7d9ba7e

  • SHA512

    213d19cb5abd83bf2eb903887856b182d8111e857b9dd9a0eedbcef4c945290108f3904cb95d04595f1b19227c494d28a0b202d3b2dc3dcc6db9c17bac479695

  • SSDEEP

    12288:mby0chFFQWNA0CsK+JBVsqit9vkpShrKvjZKnkmGDtoxKPdU7OVH8dz:mbHchF91K+JBV8ZkwhrKLMngH+OVH2

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

u8yc

Decoy

nutricionclinicaveterinaria.com

deployinghigh.com

buyulever.icu

stevencarter.love

creditcardschoicescandot.com

frangeskvor.quest

parkerstagingdesign.com

complexfund.com

aanikin.com

goodearthteeco.com

slouchsofas.com

smilebrain.club

launchyoursurveyfunnel.com

grandcazino.net

aminsfy.com

typingform.com

buten.xyz

vicinaathain.quest

opusludo.com

toncekovpodrum.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3436
    • C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2244
      • C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2696
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4856
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\New-Order,pdf.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:4420

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2244-14-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/2244-1-0x0000000000510000-0x00000000005D4000-memory.dmp

    Filesize

    784KB

  • memory/2244-2-0x00000000055E0000-0x0000000005B84000-memory.dmp

    Filesize

    5.6MB

  • memory/2244-3-0x0000000005030000-0x00000000050C2000-memory.dmp

    Filesize

    584KB

  • memory/2244-4-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/2244-5-0x0000000004FD0000-0x0000000004FDA000-memory.dmp

    Filesize

    40KB

  • memory/2244-6-0x0000000005230000-0x000000000523E000-memory.dmp

    Filesize

    56KB

  • memory/2244-7-0x00000000746CE000-0x00000000746CF000-memory.dmp

    Filesize

    4KB

  • memory/2244-8-0x00000000746C0000-0x0000000074E70000-memory.dmp

    Filesize

    7.7MB

  • memory/2244-9-0x0000000006570000-0x000000000660C000-memory.dmp

    Filesize

    624KB

  • memory/2244-10-0x00000000068A0000-0x000000000694E000-memory.dmp

    Filesize

    696KB

  • memory/2244-11-0x0000000006610000-0x0000000006640000-memory.dmp

    Filesize

    192KB

  • memory/2244-0-0x00000000746CE000-0x00000000746CF000-memory.dmp

    Filesize

    4KB

  • memory/2696-15-0x0000000001480000-0x00000000017CA000-memory.dmp

    Filesize

    3.3MB

  • memory/2696-18-0x0000000001370000-0x0000000001381000-memory.dmp

    Filesize

    68KB

  • memory/2696-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2696-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3436-28-0x0000000007B20000-0x0000000007C8E000-memory.dmp

    Filesize

    1.4MB

  • memory/3436-19-0x0000000007B20000-0x0000000007C8E000-memory.dmp

    Filesize

    1.4MB

  • memory/3436-36-0x0000000002560000-0x000000000260E000-memory.dmp

    Filesize

    696KB

  • memory/3436-34-0x0000000002560000-0x000000000260E000-memory.dmp

    Filesize

    696KB

  • memory/3436-33-0x0000000002560000-0x000000000260E000-memory.dmp

    Filesize

    696KB

  • memory/4856-22-0x0000000000E80000-0x0000000000E92000-memory.dmp

    Filesize

    72KB

  • memory/4856-27-0x0000000000740000-0x0000000000769000-memory.dmp

    Filesize

    164KB

  • memory/4856-26-0x00000000029A0000-0x0000000002CEA000-memory.dmp

    Filesize

    3.3MB

  • memory/4856-30-0x00000000027D0000-0x0000000002860000-memory.dmp

    Filesize

    576KB

  • memory/4856-25-0x0000000000740000-0x0000000000769000-memory.dmp

    Filesize

    164KB

  • memory/4856-24-0x0000000000E80000-0x0000000000E92000-memory.dmp

    Filesize

    72KB

  • memory/4856-20-0x0000000000E80000-0x0000000000E92000-memory.dmp

    Filesize

    72KB