Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2024 07:47

General

  • Target

    PAYMENT.exe

  • Size

    1.1MB

  • MD5

    d639a70d7bb8cd136bc920a15ac2a5fa

  • SHA1

    4ca0f11ba335654fe8d7dfab478202eb3d90e337

  • SHA256

    d3e580c4794a5e5e50f2334e3ecba635ed049952c30be08f283a72e299f64f8b

  • SHA512

    9a5c45f99c7e02a6965f413c3df9ca6408c24e0bfb934595199a04f899ce4bb02cfd3288b845cf20dc664476a889dc32c5f7571f07acdac93aca3308a157759e

  • SSDEEP

    24576:/Fozo5ztlrUM4QgKtGoIay1vcrP0lPn1/0S+7n4SYtqChJ+hu3A8K/dwiGY1iQSQ:/wojljIKzIa+crceGP

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

f4ut

Decoy

studiokventura.com

rmnslashes.com

oklahomapropertybuyersllc.com

pmfce.net

yingkuncy.com

theailearning.com

artistic1cleaning.com

shqinyue.com

dentaldunya.com

karatuhotel.com

renttoownhomephoenix.com

0087wt.com

hotelsearchkwnet.com

dentavangart.com

98700l.com

seattleproducecompany.com

magicparadigm.com

cunix88.com

vr646.com

calmonleiloes.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe
      "C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2296
      • C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe
        "C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2740
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1496
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:308
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:1880
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:1872
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:1692
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:824
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:2660
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:2916
                    • C:\Windows\SysWOW64\autochk.exe
                      "C:\Windows\SysWOW64\autochk.exe"
                      2⤵
                        PID:2764
                      • C:\Windows\SysWOW64\autochk.exe
                        "C:\Windows\SysWOW64\autochk.exe"
                        2⤵
                          PID:2932
                        • C:\Windows\SysWOW64\autochk.exe
                          "C:\Windows\SysWOW64\autochk.exe"
                          2⤵
                            PID:2956
                          • C:\Windows\SysWOW64\autochk.exe
                            "C:\Windows\SysWOW64\autochk.exe"
                            2⤵
                              PID:2944
                            • C:\Windows\SysWOW64\autochk.exe
                              "C:\Windows\SysWOW64\autochk.exe"
                              2⤵
                                PID:3052
                              • C:\Windows\SysWOW64\autochk.exe
                                "C:\Windows\SysWOW64\autochk.exe"
                                2⤵
                                  PID:3068
                                • C:\Windows\SysWOW64\autochk.exe
                                  "C:\Windows\SysWOW64\autochk.exe"
                                  2⤵
                                    PID:2056
                                  • C:\Windows\SysWOW64\autochk.exe
                                    "C:\Windows\SysWOW64\autochk.exe"
                                    2⤵
                                      PID:880
                                    • C:\Windows\SysWOW64\autochk.exe
                                      "C:\Windows\SysWOW64\autochk.exe"
                                      2⤵
                                        PID:3064
                                      • C:\Windows\SysWOW64\autochk.exe
                                        "C:\Windows\SysWOW64\autochk.exe"
                                        2⤵
                                          PID:2152
                                        • C:\Windows\SysWOW64\netsh.exe
                                          "C:\Windows\SysWOW64\netsh.exe"
                                          2⤵
                                          • Suspicious use of SetThreadContext
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious behavior: EnumeratesProcesses
                                          • Suspicious behavior: MapViewOfSection
                                          • Suspicious use of AdjustPrivilegeToken
                                          • Suspicious use of WriteProcessMemory
                                          PID:1820
                                          • C:\Windows\SysWOW64\cmd.exe
                                            /c del "C:\Users\Admin\AppData\Local\Temp\PAYMENT.exe"
                                            3⤵
                                            • Deletes itself
                                            • System Location Discovery: System Language Discovery
                                            PID:1832

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • memory/1220-20-0x0000000006BD0000-0x0000000006CF5000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1220-30-0x0000000006D00000-0x0000000006E82000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/1220-25-0x0000000006BD0000-0x0000000006CF5000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/1220-24-0x0000000006D00000-0x0000000006E82000-memory.dmp

                                        Filesize

                                        1.5MB

                                      • memory/1820-29-0x0000000000080000-0x00000000000A9000-memory.dmp

                                        Filesize

                                        164KB

                                      • memory/1820-28-0x0000000000D50000-0x0000000000D6B000-memory.dmp

                                        Filesize

                                        108KB

                                      • memory/1820-26-0x0000000000D50000-0x0000000000D6B000-memory.dmp

                                        Filesize

                                        108KB

                                      • memory/2296-15-0x0000000074020000-0x000000007470E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2296-7-0x00000000008D0000-0x0000000000902000-memory.dmp

                                        Filesize

                                        200KB

                                      • memory/2296-1-0x0000000000FA0000-0x00000000010B8000-memory.dmp

                                        Filesize

                                        1.1MB

                                      • memory/2296-2-0x0000000074020000-0x000000007470E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2296-3-0x000000007402E000-0x000000007402F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2296-0-0x000000007402E000-0x000000007402F000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2296-4-0x0000000074020000-0x000000007470E000-memory.dmp

                                        Filesize

                                        6.9MB

                                      • memory/2296-5-0x00000000003D0000-0x0000000000406000-memory.dmp

                                        Filesize

                                        216KB

                                      • memory/2296-6-0x000000000B2F0000-0x000000000B36A000-memory.dmp

                                        Filesize

                                        488KB

                                      • memory/2740-9-0x0000000000400000-0x0000000000429000-memory.dmp

                                        Filesize

                                        164KB

                                      • memory/2740-23-0x00000000002D0000-0x00000000002E1000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/2740-22-0x0000000000400000-0x0000000000429000-memory.dmp

                                        Filesize

                                        164KB

                                      • memory/2740-18-0x0000000000400000-0x0000000000429000-memory.dmp

                                        Filesize

                                        164KB

                                      • memory/2740-19-0x0000000000280000-0x0000000000291000-memory.dmp

                                        Filesize

                                        68KB

                                      • memory/2740-16-0x0000000000930000-0x0000000000C33000-memory.dmp

                                        Filesize

                                        3.0MB

                                      • memory/2740-10-0x0000000000400000-0x0000000000429000-memory.dmp

                                        Filesize

                                        164KB

                                      • memory/2740-12-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/2740-14-0x0000000000400000-0x0000000000429000-memory.dmp

                                        Filesize

                                        164KB