Analysis

  • max time kernel
    147s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-11-2024 20:02

General

  • Target

    mcb.exe

  • Size

    532KB

  • MD5

    ce3fe162f65754238f56df135ddd43e5

  • SHA1

    9cc55a9bc87bde222243c4fe0075288f0ede3d89

  • SHA256

    1a2da8f660bf2273096bf34961d2cd0573eae10717e7259c30e96195d2485597

  • SHA512

    e80e4304d3a7fc711c7d80785e92d6392fc9a4d54c0a96b16f8030fc4d48546416c771ae151c27f4de641817035a24c47095a4e05f44c13c3a30186fe9edd97d

  • SSDEEP

    12288:slc9Drw8FSZCWyr72w4n4e7PWP9G0bxJLg6IybwvFSMozH9prwPRD:sCt4ZjyP2w4n4Jc6TQSMU/rgD

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fg6s

Decoy

fairshakeforfarmers.com

pierpontlaw.com

expertnomad.com

ishhs.xyz

quotextaiwan.com

thaivisapro.com

madrassat-al-manahil.com

whf5.xyz

dutchpetfelt.com

wizard-nt.store

edfneu.com

zf0.net

hbxft.com

hugevari.com

websitefast.online

maisoncb.com

lghl56.com

donajisf.com

alexandertaylorforhiggins.com

evaz2.xyz

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3364
      • C:\Users\Admin\AppData\Local\Temp\mcb.exe
        "C:\Users\Admin\AppData\Local\Temp\mcb.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4024
        • C:\Users\Admin\AppData\Local\Temp\mcb.exe
          "C:\Users\Admin\AppData\Local\Temp\mcb.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3096
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1660
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\mcb.exe"
              5⤵
              • System Location Discovery: System Language Discovery
              PID:2328

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1660-11-0x0000000000BD0000-0x0000000001003000-memory.dmp

      Filesize

      4.2MB

    • memory/1660-14-0x0000000001110000-0x0000000001139000-memory.dmp

      Filesize

      164KB

    • memory/1660-12-0x0000000000BD0000-0x0000000001003000-memory.dmp

      Filesize

      4.2MB

    • memory/3096-1-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3096-2-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3096-5-0x0000000000400000-0x0000000000429000-memory.dmp

      Filesize

      164KB

    • memory/3096-4-0x000000000041D000-0x000000000041E000-memory.dmp

      Filesize

      4KB

    • memory/3364-3-0x00000000089F0000-0x0000000008B09000-memory.dmp

      Filesize

      1.1MB

    • memory/3364-7-0x00000000089F0000-0x0000000008B09000-memory.dmp

      Filesize

      1.1MB

    • memory/3364-6-0x0000000002B60000-0x0000000002C2C000-memory.dmp

      Filesize

      816KB

    • memory/3364-13-0x0000000002B60000-0x0000000002C2C000-memory.dmp

      Filesize

      816KB

    • memory/3364-16-0x0000000008400000-0x0000000008503000-memory.dmp

      Filesize

      1.0MB

    • memory/3364-18-0x0000000008400000-0x0000000008503000-memory.dmp

      Filesize

      1.0MB

    • memory/3364-19-0x0000000008400000-0x0000000008503000-memory.dmp

      Filesize

      1.0MB

    • memory/4024-0-0x0000000000442000-0x000000000044B000-memory.dmp

      Filesize

      36KB