Analysis

  • max time kernel
    149s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20241007-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-12-2024 21:57

General

  • Target

    Payment Advice for Outstanding Invoices (2).exe

  • Size

    621KB

  • MD5

    2a2d3e7c62d3b3a9e9ef3565f04a2dc5

  • SHA1

    e4829cc9645d8c2a26929d2f132cf6d0f358a988

  • SHA256

    c435fcfb3786d573ede77e30ded01503640a4de64523df7e9078cfc572381ced

  • SHA512

    0226f28426976c5bd064caabea3645062a99e1b1e99e79e4d518c783e208b299534ea9a4d1180bc43651fb1b65f72440382910b7ddf30e57ee4b8c9c9a732871

  • SSDEEP

    12288:7Zbr8K777777777777TkNdgOG0IzkXh7aolFyiSu61xdEJXouOo0XSLEdigeAaui:7F8K777777777777TiP8EFhmoMst

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

nqni

Decoy

lekitaly.com

heroteas.com

funtique.art

cedarmoonshop.com

greenozon.com

jonescompanysolutions.com

pdxls.com

icreateandcut.com

healthylifeagainnow.com

zhongxinzxpz.top

hotelsaskatchewan.info

louisebeckinsale.net

hivizpeople.com

sanjoseejidillo.com

turnspout.net

suddennnnnnnnnnnn02.xyz

annianzu.icu

webdesigncharlestonsc.com

headrank.agency

bradyiconmusiccenter.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 53 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3520
    • C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe
      "C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:920
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\IlSblFRyVadI" /XML "C:\Users\Admin\AppData\Local\Temp\tmpFB09.tmp"
        3⤵
        • System Location Discovery: System Language Discovery
        • Scheduled Task/Job: Scheduled Task
        PID:4320
      • C:\Users\Admin\AppData\Local\Temp\Payment Advice for Outstanding Invoices (2).exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1732
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:4244

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpFB09.tmp

    Filesize

    1KB

    MD5

    29a6bf584fd2f23bfc893adae238e979

    SHA1

    b8ff2fd1ea786178be37a6ef3033d18f400a9b2a

    SHA256

    e878f09bf6937560c0afe88cdb93ea57a84064a2acd14189ed28b152490ce3a1

    SHA512

    c51e68c47b8baf0e3a04ab29069311eb4cf05dad68ee183d183d3f3564740bcbfff1267f6e7cab46317e0ec631a864e329f9c2ac93666f83b46adfe09008cc37

  • memory/920-6-0x0000000074BE0000-0x0000000075390000-memory.dmp

    Filesize

    7.7MB

  • memory/920-5-0x0000000004EE0000-0x0000000004EEA000-memory.dmp

    Filesize

    40KB

  • memory/920-8-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

    Filesize

    4KB

  • memory/920-4-0x0000000004FA0000-0x000000000503C000-memory.dmp

    Filesize

    624KB

  • memory/920-17-0x0000000074BE0000-0x0000000075390000-memory.dmp

    Filesize

    7.7MB

  • memory/920-0-0x0000000074BEE000-0x0000000074BEF000-memory.dmp

    Filesize

    4KB

  • memory/920-7-0x0000000005230000-0x000000000523A000-memory.dmp

    Filesize

    40KB

  • memory/920-2-0x0000000005600000-0x0000000005BA4000-memory.dmp

    Filesize

    5.6MB

  • memory/920-9-0x0000000074BE0000-0x0000000075390000-memory.dmp

    Filesize

    7.7MB

  • memory/920-10-0x0000000008220000-0x00000000082A4000-memory.dmp

    Filesize

    528KB

  • memory/920-11-0x000000000A870000-0x000000000A8A0000-memory.dmp

    Filesize

    192KB

  • memory/920-1-0x0000000000490000-0x0000000000532000-memory.dmp

    Filesize

    648KB

  • memory/920-3-0x0000000004F00000-0x0000000004F92000-memory.dmp

    Filesize

    584KB

  • memory/1732-18-0x00000000019F0000-0x0000000001D3A000-memory.dmp

    Filesize

    3.3MB

  • memory/1732-15-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1732-21-0x0000000001410000-0x0000000001421000-memory.dmp

    Filesize

    68KB

  • memory/1732-20-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/3520-22-0x0000000002660000-0x0000000002777000-memory.dmp

    Filesize

    1.1MB

  • memory/3520-26-0x0000000002660000-0x0000000002777000-memory.dmp

    Filesize

    1.1MB

  • memory/3520-30-0x0000000007DD0000-0x0000000007F2D000-memory.dmp

    Filesize

    1.4MB

  • memory/3520-31-0x0000000007DD0000-0x0000000007F2D000-memory.dmp

    Filesize

    1.4MB

  • memory/3520-33-0x0000000007DD0000-0x0000000007F2D000-memory.dmp

    Filesize

    1.4MB

  • memory/4244-24-0x00000000006C0000-0x00000000006CC000-memory.dmp

    Filesize

    48KB

  • memory/4244-23-0x00000000006C0000-0x00000000006CC000-memory.dmp

    Filesize

    48KB

  • memory/4244-25-0x0000000000F90000-0x0000000000FB9000-memory.dmp

    Filesize

    164KB