Analysis

  • max time kernel
    146s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:34

General

  • Target

    b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe

  • Size

    292KB

  • MD5

    be6ece1b6510c986870d8ceabb87988b

  • SHA1

    63795ce8b9c7fd5ec3374e3e012b3898a8695f53

  • SHA256

    b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f

  • SHA512

    c7296be4cf5c14ada776312ceeedd29b52b6e4e228e6f1453e5485571099f6c517e90c6f33b88835b51130056bca6d2401d1bd6aed7e0b9d590d3b7b2c60a334

  • SSDEEP

    6144:oweQYmMhY6ydhGhzXu2UDOyDSWwDrW12P4v2B/Bd66R6DWV:6QYNILOzWwDrWsg2JBxR6DWV

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p2a5

Decoy

gorillaslovebananas.com

zonaextasis.com

digitalpravin.online

memorialdoors.com

departmenteindhoven.com

vipulb.com

ruyibao365.com

ynpzz.com

matthewandjessica.com

winfrey2024.com

janetride.com

arairazur.xyz

alltheheads.com

amayawebdesigns.com

califunder.com

blacksource.xyz

farmasi.agency

ilmkibahar.com

thinkcentury.net

eskortclub.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1184
    • C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe
      "C:\Users\Admin\AppData\Local\Temp\b7cf8d9d8db4c5eaf796d35251bfc2b24f34c2c77d2ca82a1ebf470323c0894f.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2660
      • C:\Users\Admin\AppData\Local\Temp\cznfe.exe
        C:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Users\Admin\AppData\Local\Temp\cznfe.exe
          C:\Users\Admin\AppData\Local\Temp\cznfe.exe C:\Users\Admin\AppData\Local\Temp\tostc
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2748
    • C:\Windows\SysWOW64\wininit.exe
      "C:\Windows\SysWOW64\wininit.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\cznfe.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\3tmmjx84hcpzeac8q

    Filesize

    210KB

    MD5

    c991010927a0003b352fe645f53122da

    SHA1

    282c97fcd98de42ffad1879d51f62e711fb2d0d2

    SHA256

    05201a873aaed950ff031f861daf6fcd1bc23345458fa9152b9486731ddbfca9

    SHA512

    c0f6c9e121f81c95164326f36c2f5e587b5b1d30801400bafcb39f98fa0274ccdf0a0d3f888053f0929a7998850384fb0910924a82c83ce949893c5743cf7008

  • C:\Users\Admin\AppData\Local\Temp\tostc

    Filesize

    4KB

    MD5

    9a6b34eb6752b9ece6f47081f02565c4

    SHA1

    b7a73450048bbcde6953886f3d7b177e2434ea0d

    SHA256

    274d7ddab57e4caf3fca959b4b5c8a2842fe68196593f0aa7453855cf9e20242

    SHA512

    edc1baf7792d8e88a61d397173fb84e5e3f36cf738020a6e8557462c6def570c541e371cd289ff4f0704d08697aa01476aad8bcfc8e7e11c5fa0b1d8602efe2a

  • \Users\Admin\AppData\Local\Temp\cznfe.exe

    Filesize

    120KB

    MD5

    3464aade4cb916d733fdd606c3d70165

    SHA1

    0c47d2c2d6a12cb78275f0d9b3190b1aad04805b

    SHA256

    a1b617196797fb690647c6f4f0329be8087bdaf222bdbe8bcd762ebb619e5ad2

    SHA512

    a4c01810521414aa8ca7757fae35f8710f37d109360d240483063dd22db3e94e32cf9819022e4e1d7b3ee7845fa635bd9417645beb99b400bf3f8e93cafbfbeb

  • memory/1184-26-0x0000000000190000-0x0000000000290000-memory.dmp

    Filesize

    1024KB

  • memory/1184-24-0x00000000063A0000-0x00000000064DD000-memory.dmp

    Filesize

    1.2MB

  • memory/1184-17-0x0000000000010000-0x0000000000020000-memory.dmp

    Filesize

    64KB

  • memory/1184-20-0x00000000063A0000-0x00000000064DD000-memory.dmp

    Filesize

    1.2MB

  • memory/2272-22-0x0000000000CD0000-0x0000000000CEA000-memory.dmp

    Filesize

    104KB

  • memory/2272-23-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB

  • memory/2272-21-0x0000000000CD0000-0x0000000000CEA000-memory.dmp

    Filesize

    104KB

  • memory/2748-19-0x0000000000190000-0x00000000001A1000-memory.dmp

    Filesize

    68KB

  • memory/2748-18-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2748-15-0x0000000000BF0000-0x0000000000EF3000-memory.dmp

    Filesize

    3.0MB

  • memory/2748-12-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2752-9-0x0000000000160000-0x0000000000162000-memory.dmp

    Filesize

    8KB