Analysis

  • max time kernel
    148s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-11-2024 20:53

General

  • Target

    5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe

  • Size

    315KB

  • MD5

    d51f1d0cfd3d340217a10563e26b874b

  • SHA1

    7a0208d13ecf6943af12a9f49b1f66b10d3ebeda

  • SHA256

    5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1

  • SHA512

    53a440e7b2d450c15fc340a79f586c7d6021ddd3adffe8af9ec9cd54b301749abfd10184d784cd2dea6a0595576cbe7526d4c7de838f2c183c297e90285e7f77

  • SSDEEP

    6144:TxDZ+uY3Vi2Ad8nC3aXrPvT0b663EFC7TY6aU3DaQuwgTNN1rxf:z/acTdf3E5dUvYjU3uLw+rN

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fsgg

Decoy

0520ks.com

cimeza-africa.com

eth.download

malcolmdawson.com

deleaderainfluenceur.com

goodwinutotint.com

eyehealthtnpasumo1.xyz

ban-click.com

whf5.xyz

ambatika.com

awaisqarni.com

reduziert.xyz

quearsvone.xyz

mundohightech.com

radonpay.com

dmgsouthgateway.com

discountbeautysupply4u.com

hackworthcenter.com

sofobw.com

virepost.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 4 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe
      "C:\Users\Admin\AppData\Local\Temp\5f8d69976e4d3c9b6508cd376dcab4971a605d8d1122952ad604f7b48d2ef1e1.exe"
      2⤵
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2448
      • C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe
        C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe C:\Users\Admin\AppData\Local\Temp\kabuheez
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:316
        • C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe
          C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe C:\Users\Admin\AppData\Local\Temp\kabuheez
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2072
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\kyggpnadk.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2948

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\kabuheez

    Filesize

    4KB

    MD5

    f4e69538b872c4a0005275ccd06b88b2

    SHA1

    63a4a19da4aa83a1f040d1e0e6ea7c1a67ed84f3

    SHA256

    5bc9e2ec5f966541bc3c52d12c305e3955833b2caf7ac4e1645f0e58c45f716b

    SHA512

    32d56b218dbfffe275fb961731bea31cd3893125ff0ea3a5e93321ece3b7575f2f959e0771b709238b32ceb4668b628640e043f16a96ab989577bada0992d61f

  • C:\Users\Admin\AppData\Local\Temp\mjr8sde7g4e

    Filesize

    212KB

    MD5

    bda3c190a54ea571844e1ad4e2d41eb6

    SHA1

    a14c828399fed12a07b621f3a6c3f54799763219

    SHA256

    650af1d156699b93a193e5f719028f9ede7c7c2685f8f04714d936dc74d91080

    SHA512

    6b9845370155e9f4e1a15c208ab78b5d7eed6dab4e257717adb34b45c473fdab3b34c0c91b1dc0c20edb889d01c5e6e4c4ae48d1b3ebc1e03be447117dd35145

  • \Users\Admin\AppData\Local\Temp\kyggpnadk.exe

    Filesize

    168KB

    MD5

    5258ea17d00705e2accee3c63e21d7ab

    SHA1

    ae2d56d597d50bda9dadca39cd71b8488a28682c

    SHA256

    8e9b30213dcab171d3e65d0da99e4a847da5cba6fc47f3641d90e8d6e70637b6

    SHA512

    30c68b68b4caa22747bc8312fad4089d5d45e10565f03718d8ce4fdf9d5b53f8e60a9d5ca73fec521437ccf63eb902cc9a5534cafe1ffff7658810e438747e8e

  • memory/316-9-0x0000000000230000-0x0000000000232000-memory.dmp

    Filesize

    8KB

  • memory/1208-18-0x0000000006C50000-0x0000000006DBE000-memory.dmp

    Filesize

    1.4MB

  • memory/1208-22-0x0000000007260000-0x00000000073A2000-memory.dmp

    Filesize

    1.3MB

  • memory/1208-21-0x0000000006C50000-0x0000000006DBE000-memory.dmp

    Filesize

    1.4MB

  • memory/1208-28-0x0000000007260000-0x00000000073A2000-memory.dmp

    Filesize

    1.3MB

  • memory/2072-16-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2072-14-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2072-20-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/2772-26-0x0000000000A40000-0x0000000000CC1000-memory.dmp

    Filesize

    2.5MB

  • memory/2772-25-0x0000000000A40000-0x0000000000CC1000-memory.dmp

    Filesize

    2.5MB

  • memory/2772-27-0x0000000000080000-0x00000000000A9000-memory.dmp

    Filesize

    164KB