Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:41

General

  • Target

    PO3118.exe

  • Size

    393KB

  • MD5

    7472bc65871e7bef7264c09fcc028e4f

  • SHA1

    c0420262972a81c2332f83a0736f48ce500dc2b6

  • SHA256

    d6ddafd9aa4fbe03e73aa4f1b4854d83503eb4fe9b91dd6f3ac44a030847c2d7

  • SHA512

    bd4c3397af0c66626ab5c35c95bb5dd74134ef348375cd338a1013c8b1c9ccf8fe936f23874153cb32145c55c01ac660d0db293e0d7451eacc907540eb9accdf

  • SSDEEP

    6144:id/ztr1lc8xB6SSQ8mst8hTM+713eGlaUlBfqcOvCom2K9ItlkEvmrVuy5A:WvlcWBe/WRiJHmYtlPaVuyC

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

pnqr

Decoy

bullexch9.com

hiiidesigns.com

yosapark-gakuenmae.com

movementinspires.com

orlandas.com

flowga.world

opende.info

jiconic.com

selviclothingco.com

herbalmedicineresearch.com

contex33.xyz

riord.com

alchemistslibrary.com

ecalyte.com

tutu119.com

61ue00.com

properwayllc.com

tamitoe.com

adacompliantsoftware.com

deliabe.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1212
      • C:\Users\Admin\AppData\Local\Temp\PO3118.exe
        "C:\Users\Admin\AppData\Local\Temp\PO3118.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3068
        • C:\Users\Admin\AppData\Local\Temp\PO3118.exe
          "C:\Users\Admin\AppData\Local\Temp\PO3118.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2440
          • C:\Windows\SysWOW64\wininit.exe
            "C:\Windows\SysWOW64\wininit.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • System Location Discovery: System Language Discovery
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\PO3118.exe"
              5⤵
              • Deletes itself
              • System Location Discovery: System Language Discovery
              PID:2808

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsjBA3C.tmp\cvve2p5h0gqmdd.dll

      Filesize

      4KB

      MD5

      7dca75191f506b4a9dac4683211aafc0

      SHA1

      c31b50e4d74aae90730d308d70e166c6c031ec54

      SHA256

      28b2482383978cb373546a80213c9c6d03e4af09f2399e5b8d115811f822200e

      SHA512

      382d43c225cc815a796be1a66f111dd396ce8921fb424d92987cd3055850272f597d5eee4d84ae1b888577833e134b296934a37a26c882d04f520462d99aaa74

    • memory/1212-12-0x00000000049B0000-0x0000000004B1A000-memory.dmp

      Filesize

      1.4MB

    • memory/1212-15-0x00000000049B0000-0x0000000004B1A000-memory.dmp

      Filesize

      1.4MB

    • memory/1212-16-0x0000000004CA0000-0x0000000004D64000-memory.dmp

      Filesize

      784KB

    • memory/1212-22-0x0000000004CA0000-0x0000000004D64000-memory.dmp

      Filesize

      784KB

    • memory/2440-9-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2440-11-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2440-14-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2500-20-0x00000000008D0000-0x00000000008EA000-memory.dmp

      Filesize

      104KB

    • memory/2500-21-0x00000000008D0000-0x00000000008EA000-memory.dmp

      Filesize

      104KB

    • memory/2500-23-0x0000000000100000-0x0000000000128000-memory.dmp

      Filesize

      160KB

    • memory/3068-8-0x0000000000310000-0x0000000000312000-memory.dmp

      Filesize

      8KB