Analysis

  • max time kernel
    145s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:10

General

  • Target

    f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe

  • Size

    352KB

  • MD5

    fc7eb63804088472b1cac1ac9fe5d16f

  • SHA1

    63205c7b5c84296478f1ad7d335aa06b8b7da536

  • SHA256

    f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a

  • SHA512

    57c0dcf7689e04e172d4adfdd6295618cb5695034739a4c57d0fd871b864345e54dd05ed5c3475579ff742c947202618c59db0ea351f52521e1cf7622f007734

  • SSDEEP

    6144:UwxU76BJzteu9g8LJId0ER61it8LeZf5sm22UPLwkkBPPmK4vQniV:JU74eYg8ddER6C8LCKJ6PPmJvQiV

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

d6cd

Decoy

fatmerlion.com

gpo777.com

pacpointfg.com

s3k9r3de.com

jakitrade.com

tmsweets.biz

goodfoodsme.com

teddydefi.com

banahinvestments.com

kuvinziarno.quest

gma-bea10.com

onepotato.xyz

olympusconstructioncompany.com

amvids.info

tmc.wiki

swiftlybliss.com

provopreserve.com

rsvprose.com

staffremotely.com

diversifiedcontractingla.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe
      "C:\Users\Admin\AppData\Local\Temp\f7d7da0700921b339807b5977c36fce50742c5ce87f432d357f9d3e8e683785a.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3068
      • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
        C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe
          C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe C:\Users\Admin\AppData\Local\Temp\krqtdytaag
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2800
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2408

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\krqtdytaag

    Filesize

    4KB

    MD5

    b2e7c8631c39f0df1e14be81e7482aaf

    SHA1

    886c520daf38b08b4d32f3f522375cca39ad2c0b

    SHA256

    eee2111c310af6f27fa8e5eb4a9378302bcd4a2a32397ca39119cd057158425f

    SHA512

    1e858289210242b9fd87991e56f4db7fd30f3888fca4e8d78e845f781cdfee3ef508304c09f5d59c656ae933e67f6b9471ea7459721698a4cbedd39d6b7a7e6c

  • C:\Users\Admin\AppData\Local\Temp\ktvrnf.exe

    Filesize

    117KB

    MD5

    918b5b3ab8c29f68394eb7017a42aa85

    SHA1

    1a783f39a9ed81412bc018a0d54a116bf9de3277

    SHA256

    b4e506d84bae993428232dd52683753944461f639b7228639be20000563a96e3

    SHA512

    4a50d82e01690f12f6254f31f11db1fe69d40891b84675d4db25b55b90eb58a078ddafbeb125330df7dec31c6d6af752186ba57a05fd9eb5b6592b636885f672

  • C:\Users\Admin\AppData\Local\Temp\l3vfu7hizn2

    Filesize

    210KB

    MD5

    5250e815ed0a5fb4eb4f2c9675dfb7e8

    SHA1

    46a0b7ddfd941e667e1201dd511a22b9a981cd3d

    SHA256

    0439dbfaa3df7150e41a27bf65f511c3ebb4c1fbbf8b005983c51013b496bc0c

    SHA512

    e31ebda956be17a00e2632a1a10e25dc3070a5feda166354c8dec5accd52e10c353d22ec5447f87f489f24163cd17bbd26a9d50cd3ec48063409293341702cf9

  • memory/1216-18-0x0000000005100000-0x0000000005295000-memory.dmp

    Filesize

    1.6MB

  • memory/1216-24-0x0000000005100000-0x0000000005295000-memory.dmp

    Filesize

    1.6MB

  • memory/2696-9-0x00000000002B0000-0x00000000002B2000-memory.dmp

    Filesize

    8KB

  • memory/2800-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2800-17-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2876-21-0x0000000000340000-0x0000000000358000-memory.dmp

    Filesize

    96KB

  • memory/2876-22-0x0000000000340000-0x0000000000358000-memory.dmp

    Filesize

    96KB

  • memory/2876-23-0x0000000000100000-0x0000000000129000-memory.dmp

    Filesize

    164KB