Analysis

  • max time kernel
    147s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:34

General

  • Target

    DC Viet Nam Order list 6-25-21.exe

  • Size

    264KB

  • MD5

    e1df9b8f6170bc4241edffd642949901

  • SHA1

    261767a7e271d39393619109d1310f04dfba5b41

  • SHA256

    8b225e713429dd95fed7fe2af260d9076d627279fc86d152baedd973f0b72304

  • SHA512

    ce8101ebf096555be8e6cd02d261ae9a244978e91247291528d4cc49689cf5f1760f54672cfb5dd5648ac0a6c8956011faa4faf2bc63a06bc402cfdc9c74f23a

  • SSDEEP

    6144:rTqjFeDgN8f9QQbj67yFKvyiUmSw87aplOTCMCNY8r0lkssE3plf:fZg4qQb8FzUmS7ClOTCnJglWE3

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

s4h4

Decoy

v65mwh.com

ofertasempresariais.com

apoteklowamedika.com

shopblvdhair.com

jtcameraftp.com

vimlark.com

wamodo.com

mistersvisuals.com

copterapps.com

jamesebraxton.com

darmarcasepatentes.com

texasroofrepairpros.com

okaycollective.net

rughouzz.com

dgzhileng.com

markstipsandtoes.com

globalgrowlights.com

thehustleandco.com

fdgrenewables.com

sweetsells.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe
      "C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe
        "C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2804
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:2784
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:2756
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:2768
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:2600
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:2764
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:2716
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:2744
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:2632
                    • C:\Windows\SysWOW64\autochk.exe
                      "C:\Windows\SysWOW64\autochk.exe"
                      2⤵
                        PID:2692
                      • C:\Windows\SysWOW64\autochk.exe
                        "C:\Windows\SysWOW64\autochk.exe"
                        2⤵
                          PID:2776
                        • C:\Windows\SysWOW64\autochk.exe
                          "C:\Windows\SysWOW64\autochk.exe"
                          2⤵
                            PID:2580
                          • C:\Windows\SysWOW64\autochk.exe
                            "C:\Windows\SysWOW64\autochk.exe"
                            2⤵
                              PID:2588
                            • C:\Windows\SysWOW64\autochk.exe
                              "C:\Windows\SysWOW64\autochk.exe"
                              2⤵
                                PID:2596
                              • C:\Windows\SysWOW64\autochk.exe
                                "C:\Windows\SysWOW64\autochk.exe"
                                2⤵
                                  PID:2636
                                • C:\Windows\SysWOW64\autochk.exe
                                  "C:\Windows\SysWOW64\autochk.exe"
                                  2⤵
                                    PID:2656
                                  • C:\Windows\SysWOW64\autochk.exe
                                    "C:\Windows\SysWOW64\autochk.exe"
                                    2⤵
                                      PID:1300
                                    • C:\Windows\SysWOW64\autochk.exe
                                      "C:\Windows\SysWOW64\autochk.exe"
                                      2⤵
                                        PID:1696
                                      • C:\Windows\SysWOW64\autochk.exe
                                        "C:\Windows\SysWOW64\autochk.exe"
                                        2⤵
                                          PID:2108
                                        • C:\Windows\SysWOW64\autochk.exe
                                          "C:\Windows\SysWOW64\autochk.exe"
                                          2⤵
                                            PID:2628
                                          • C:\Windows\SysWOW64\autochk.exe
                                            "C:\Windows\SysWOW64\autochk.exe"
                                            2⤵
                                              PID:2068
                                            • C:\Windows\SysWOW64\cmstp.exe
                                              "C:\Windows\SysWOW64\cmstp.exe"
                                              2⤵
                                              • Suspicious use of SetThreadContext
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious behavior: EnumeratesProcesses
                                              • Suspicious behavior: MapViewOfSection
                                              • Suspicious use of AdjustPrivilegeToken
                                              • Suspicious use of WriteProcessMemory
                                              PID:2752
                                              • C:\Windows\SysWOW64\cmd.exe
                                                /c del "C:\Users\Admin\AppData\Local\Temp\DC Viet Nam Order list 6-25-21.exe"
                                                3⤵
                                                • Deletes itself
                                                • System Location Discovery: System Language Discovery
                                                PID:1636

                                          Network

                                          MITRE ATT&CK Enterprise v15

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads

                                          • \Users\Admin\AppData\Local\Temp\nstEBD7.tmp\System.dll

                                            Filesize

                                            10KB

                                            MD5

                                            56a321bd011112ec5d8a32b2f6fd3231

                                            SHA1

                                            df20e3a35a1636de64df5290ae5e4e7572447f78

                                            SHA256

                                            bb6df93369b498eaa638b0bcdc4bb89f45e9b02ca12d28bcedf4629ea7f5e0f1

                                            SHA512

                                            5354890cbc53ce51081a78c64ba9c4c8c4dc9e01141798c1e916e19c5776dac7c82989fad0f08c73e81aaba332dad81205f90d0663119af45550b97b338b9cc3

                                          • memory/1256-14-0x0000000004710000-0x00000000047CF000-memory.dmp

                                            Filesize

                                            764KB

                                          • memory/1256-17-0x0000000004710000-0x00000000047CF000-memory.dmp

                                            Filesize

                                            764KB

                                          • memory/1256-18-0x0000000006740000-0x0000000006859000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/1256-25-0x0000000006740000-0x0000000006859000-memory.dmp

                                            Filesize

                                            1.1MB

                                          • memory/2752-21-0x0000000000750000-0x0000000000768000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/2752-23-0x0000000000750000-0x0000000000768000-memory.dmp

                                            Filesize

                                            96KB

                                          • memory/2752-24-0x00000000000D0000-0x00000000000F9000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/2804-11-0x0000000000400000-0x0000000000429000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/2804-13-0x0000000000400000-0x0000000000429000-memory.dmp

                                            Filesize

                                            164KB

                                          • memory/2804-16-0x0000000000400000-0x0000000000429000-memory.dmp

                                            Filesize

                                            164KB