Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:00

General

  • Target

    445015adc9e5203bd1dea0c8a5e45ca4c523f17eb499c828b092f377d0315c1d.exe

  • Size

    642KB

  • MD5

    329b51e6b21547ec23a60876ca4b4003

  • SHA1

    cec566832bfbeaa23fe020dfc53f97e52619a3fc

  • SHA256

    445015adc9e5203bd1dea0c8a5e45ca4c523f17eb499c828b092f377d0315c1d

  • SHA512

    e66dc4b44e560079ca4f78730603bcd0d9e39881f506727f849031f4dc190b828e9e7cc6cec094bcf20758df9006a22463a84da025d5ff824a8c4f3d6ca8d4c7

  • SSDEEP

    12288:YeEvQVtebZbPCNtml8vXfH60Q+LkA71fkFTklb1FU:YeEvQVIbZreml8nH+eeklbw

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

e0ep

Decoy

disignmagazine.com

suuteki-no-anaba.com

12daysofwriting.com

kimsat.art

cbsautoplex.com

gmconstructionlnc.com

downlownft.com

uzh.biz

joviafinanical.com

receiptsloepc.xyz

avcarpet.com

smartlifepack.net

syllyl.com

lifecoach.directory

mom-wponline-sg.com

usaworkerscorporation.com

zionnolan.com

ort-care.com

roledepartamentos.com

solideo.holdings

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\445015adc9e5203bd1dea0c8a5e45ca4c523f17eb499c828b092f377d0315c1d.exe
    "C:\Users\Admin\AppData\Local\Temp\445015adc9e5203bd1dea0c8a5e45ca4c523f17eb499c828b092f377d0315c1d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:3904
    • C:\Users\Admin\AppData\Local\Temp\445015adc9e5203bd1dea0c8a5e45ca4c523f17eb499c828b092f377d0315c1d.exe
      "{path}"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3580-13-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3580-16-0x00000000013F0000-0x000000000173A000-memory.dmp

    Filesize

    3.3MB

  • memory/3904-8-0x00000000080E0000-0x00000000080EA000-memory.dmp

    Filesize

    40KB

  • memory/3904-9-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

    Filesize

    4KB

  • memory/3904-4-0x0000000005290000-0x0000000005322000-memory.dmp

    Filesize

    584KB

  • memory/3904-5-0x0000000005210000-0x000000000521A000-memory.dmp

    Filesize

    40KB

  • memory/3904-6-0x0000000005490000-0x00000000054E6000-memory.dmp

    Filesize

    344KB

  • memory/3904-7-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB

  • memory/3904-0-0x0000000074D8E000-0x0000000074D8F000-memory.dmp

    Filesize

    4KB

  • memory/3904-3-0x0000000005840000-0x0000000005DE4000-memory.dmp

    Filesize

    5.6MB

  • memory/3904-10-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB

  • memory/3904-11-0x00000000085C0000-0x0000000008642000-memory.dmp

    Filesize

    520KB

  • memory/3904-12-0x000000000ABD0000-0x000000000AC00000-memory.dmp

    Filesize

    192KB

  • memory/3904-2-0x0000000005140000-0x00000000051DC000-memory.dmp

    Filesize

    624KB

  • memory/3904-15-0x0000000074D80000-0x0000000075530000-memory.dmp

    Filesize

    7.7MB

  • memory/3904-1-0x00000000006E0000-0x0000000000788000-memory.dmp

    Filesize

    672KB