Analysis

  • max time kernel
    146s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:13

General

  • Target

    79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe

  • Size

    313KB

  • MD5

    da75710d466d2544bc8f4442b1ce57eb

  • SHA1

    8356ff061e4864bfe114fb9e65bed20c267c78e3

  • SHA256

    79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917

  • SHA512

    6d5c8f28f60bd494cade7bf4324c3309ac29a421202dae3494b8118ade429560e4062a2c83bacbfea46c63fe173bc04ffc299b8dcd2f611d67c45e7cf2c22695

  • SSDEEP

    6144:TxD3m22lVTV6BSLia0bfMUB8uEqLjLQ7LYAbesH/pAK+eRBYBD:Vm246BSLTkfN8ubLj4Uy/pAKaD

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ciaz

Decoy

jobgeist.com

pxwss.com

nathanaeljeffrey.xyz

rhoypl.biz

avachaturbate.com

xvideopornfilm.com

heser.net

olphschoolcrabfeed.com

ballygallycastle.com

attunetouchandglow.com

wwwswanciitaphotography.com

inspinevision.com

ebabadofood.com

glenngreerforlyman.com

stickojfni.online

cursophpbr.xyz

thefindommistress.com

8c9myn92dzep.biz

alexamedia.art

rarerp.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe
      "C:\Users\Admin\AppData\Local\Temp\79e8144ee4e2e97695849928e162288fc282de48ff4caea48314f9cb56477917.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3048
      • C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe
        C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2708
        • C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe
          C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1720
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\yjpsyjwo.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:1952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\vhdpeghnoh

    Filesize

    4KB

    MD5

    0166caeddc243f04eacfbf1f056a30d9

    SHA1

    68e0ee392397414c1162ddea3b195ab0204006ae

    SHA256

    43bcdc82047a603ae2e2d2635c1d3dcfa22a5e08808b3a5c2dbef4e648af75ff

    SHA512

    b03886ebefa1fa2f5be8739cca14fb5e62a40e5d07c0d254e664f77cee8e135f9c6160aa619a85346fb426154cab4acefe63dad9299c828f3c5f1225015b7c02

  • C:\Users\Admin\AppData\Local\Temp\wlaj5pjdhxtch

    Filesize

    210KB

    MD5

    120e3f53c350aa1ea669ee65d35507cf

    SHA1

    d935f721cb06ab56b6d8a8a24f1bdbbd9c78a1a0

    SHA256

    4225889013fa833a51d12ce224d672444e281daa6d295fb83b5fc189db657418

    SHA512

    0d9f08105562005031f7533d8034b09565ae866318c7bd1ef9df5844e1da5147bc4c6904223268af918120ead6c6517750fd6fa5ef76f8723e86c050fb29f10c

  • \Users\Admin\AppData\Local\Temp\yjpsyjwo.exe

    Filesize

    168KB

    MD5

    c55e114aae523179f507d32858962fe4

    SHA1

    3a35f75de10123d4b438d7be88c6bae7087a9a74

    SHA256

    445868ae39772e2a65c0e927d6a98d240d93c8515d57837b95c17304ea0dd693

    SHA512

    3900a645770ed43ab18de621f85f83588efe9fafee732277ee26e361dc417560a0aacea392d7975634e16f250734dea1f15c8aa26fb8b80c31bec1833da9044c

  • memory/1208-17-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/1208-18-0x0000000004BF0000-0x0000000004CD2000-memory.dmp

    Filesize

    904KB

  • memory/1208-24-0x0000000004BF0000-0x0000000004CD2000-memory.dmp

    Filesize

    904KB

  • memory/1720-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1720-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2020-21-0x00000000004B0000-0x00000000005A4000-memory.dmp

    Filesize

    976KB

  • memory/2020-22-0x00000000004B0000-0x00000000005A4000-memory.dmp

    Filesize

    976KB

  • memory/2020-23-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB

  • memory/2708-8-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB