Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:13

General

  • Target

    f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe

  • Size

    374KB

  • MD5

    0b18aa7f23e897c6d6557f3e8b7e676a

  • SHA1

    7ceefcc2c6ccab4cf4108ebee0847b45357b72a8

  • SHA256

    f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a

  • SHA512

    0ed269ebac3b9623254ea3800b08c8666426386582caa6a3160b84dd53a923e474e9baee0f6347498549c7382ad67f29f170a1c9d0d3735e5e152a2d58379bbb

  • SSDEEP

    6144:TBlL/Pa4ogLeqRqkZ/UrBZbBbBTWyGwH7BeZgcTQogYeC:F9JTVRWzNVBXH77cTog

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

uoe8

Decoy

chalance.design

certifiedlaywernj.com

bsbgraphic.com

caeka.com

zagorafinancial.com

cvingenieriacivil.net

mojilifenoosa.com

bucktheherd.net

sparkmonic.com

catherineandwilson.com

cdefenders.com

intersp.net

santoriniimpressivetours.net

arkansaspaymentrelief.com

tewab.com

bjzjgjg.com

michgoliki.com

oallahplease.com

plaisterpress.com

redyroblx.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 5 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe
    "C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe
      "C:\Users\Admin\AppData\Local\Temp\f17173c42ee2394c24b3ea486e912fedc81659d5c8faa2a1360461a71ffda47a.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:2500

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nstA96A.tmp\System.dll

    Filesize

    10KB

    MD5

    56a321bd011112ec5d8a32b2f6fd3231

    SHA1

    df20e3a35a1636de64df5290ae5e4e7572447f78

    SHA256

    bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

    SHA512

    5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

  • memory/2500-11-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB