Analysis

  • max time kernel
    150s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21/11/2024, 20:34

General

  • Target

    PROFORMA_INVOICE_pdf.exe

  • Size

    761KB

  • MD5

    66dd27da37cdd67246a447220949d943

  • SHA1

    9158ff8fa1c879152487665c0dc37e8d6c91b00d

  • SHA256

    eb20acaf619f8bec9cf1e1353600b3825744b86b0a4281a299efefeb91b93c35

  • SHA512

    98f2a3e56eeb4bcee9a1f055e1f8cbb12cc4e3333a04a3b7770b4b30bd74ea18f1220a71679188d3e925d945449f522664ba75cd6fe4c3771aa8715cd52981d8

  • SSDEEP

    12288:wQ1n6Xu/kw+RL8RaE8qr/y9uBQBIBfFYTSanW6ivuB5oW:L6+4Ed/ycsI8uyIW

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

me2z

Decoy

rampdauto.com

noriharte.com

harborfreightcreditcard.com

tktspyhwz.icu

cagehosting.com

hgfte.club

fullnessspa.com

link-repair.com

rrjyds.com

edevletdestekcardmerkez.com

sprayingmachines.com

janerowenlester.com

velocityworkflow.com

kcrm.computer

kjbubeng.com

virtualhockeyconference.com

trugrits.com

creativesociallight.com

dnaswabtesting.com

willpool.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SgFiknYhVNpgso" /XML "C:\Users\Admin\AppData\Local\Temp\tmp4CB9.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:2908
      • C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2772
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2664
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PROFORMA_INVOICE_pdf.exe"
        3⤵
        • Deletes itself
        • System Location Discovery: System Language Discovery
        PID:2652

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\tmp4CB9.tmp

          Filesize

          1KB

          MD5

          42f0a2169bb7c2df4510539dc5ccf788

          SHA1

          0fe8ca7a0efb815785b8fba748d4d59d91681d74

          SHA256

          cde93f014b726da9d86dcd7503b6ac838db7c647a70cc938bfc33e7169a65bb7

          SHA512

          4a7d606b7d81dd8ab89df3d50059616f3793024af2a05d8f0deeb06d48ae3db39f47a8da3f2a743e22dc35eb00919c30e49e7fbf67609b14b9b89586fb4382ef

        • memory/1232-20-0x0000000004720000-0x00000000047DA000-memory.dmp

          Filesize

          744KB

        • memory/1232-25-0x0000000006F60000-0x00000000070EB000-memory.dmp

          Filesize

          1.5MB

        • memory/1232-26-0x0000000004720000-0x00000000047DA000-memory.dmp

          Filesize

          744KB

        • memory/2444-6-0x0000000001EC0000-0x0000000001F16000-memory.dmp

          Filesize

          344KB

        • memory/2444-5-0x0000000073CC0000-0x00000000743AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2444-21-0x0000000073CC0000-0x00000000743AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2444-4-0x0000000073CCE000-0x0000000073CCF000-memory.dmp

          Filesize

          4KB

        • memory/2444-3-0x0000000000420000-0x000000000042A000-memory.dmp

          Filesize

          40KB

        • memory/2444-0-0x0000000073CCE000-0x0000000073CCF000-memory.dmp

          Filesize

          4KB

        • memory/2444-2-0x0000000073CC0000-0x00000000743AE000-memory.dmp

          Filesize

          6.9MB

        • memory/2444-1-0x0000000000200000-0x00000000002C8000-memory.dmp

          Filesize

          800KB

        • memory/2664-29-0x0000000000080000-0x00000000000A9000-memory.dmp

          Filesize

          164KB

        • memory/2664-27-0x0000000049F60000-0x0000000049FAC000-memory.dmp

          Filesize

          304KB

        • memory/2664-28-0x0000000049F60000-0x0000000049FAC000-memory.dmp

          Filesize

          304KB

        • memory/2772-16-0x0000000000A00000-0x0000000000D03000-memory.dmp

          Filesize

          3.0MB

        • memory/2772-19-0x0000000000370000-0x0000000000381000-memory.dmp

          Filesize

          68KB

        • memory/2772-23-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2772-24-0x00000000003B0000-0x00000000003C1000-memory.dmp

          Filesize

          68KB

        • memory/2772-18-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2772-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/2772-15-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2772-11-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB

        • memory/2772-10-0x0000000000400000-0x0000000000429000-memory.dmp

          Filesize

          164KB