Analysis

  • max time kernel
    121s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    25/03/2025, 03:52

General

  • Target

    15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe

  • Size

    675KB

  • MD5

    ba2ad8e5ad780bd8024ffadc7f2d76e9

  • SHA1

    71dd5d11f101b56628bc7949a0e32ff0ead01af8

  • SHA256

    15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7

  • SHA512

    b283fdf4ce548412eeb920cd9d1fce43026857dec34a189853ef8f0a94b7c6495d96e974334d84b35bcc38dce7a1dd74aeeaafaba5e59644354d73edf870aacb

  • SSDEEP

    12288:M+iri2d2mjMap3Bp1nQu4EonieFN2Mk+2vp51/wdzoGygQgJ+m4M4:qri8ukP1nQOonvwt7psygv

Malware Config

Extracted

Family

xloader

Version

2.1

Campaign

dn87

Decoy

yiyuge.club

sdzrwoe.icu

divifarsi.com

sunsal.net

animeziyan.com

onlinemastersdegree.site

medknizhka.info

lowlife.one

livingroomexercise.com

themantrini.com

starconverters.com

kyssclothing.com

sa18i.art

smartdaymall.com

ohyeahblog.net

losriosnosunen.com

joannamarshwriter.com

restlanekysseoffer.com

oonabody.com

azarksigningagent.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader family
  • Xloader payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe
    "C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe
      "{path}"
      2⤵
        PID:2076
      • C:\Users\Admin\AppData\Local\Temp\15a8b67526b6b563f7fd48850bc4d5fb10e504bb9b2b156c9ce1d82a8a7aaaa7.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:2732

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2148-6-0x0000000074350000-0x0000000074A3E000-memory.dmp

      Filesize

      6.9MB

    • memory/2148-7-0x0000000004EB0000-0x0000000004F34000-memory.dmp

      Filesize

      528KB

    • memory/2148-2-0x0000000004770000-0x0000000004808000-memory.dmp

      Filesize

      608KB

    • memory/2148-3-0x0000000074350000-0x0000000074A3E000-memory.dmp

      Filesize

      6.9MB

    • memory/2148-4-0x00000000008C0000-0x00000000008DE000-memory.dmp

      Filesize

      120KB

    • memory/2148-5-0x000000007435E000-0x000000007435F000-memory.dmp

      Filesize

      4KB

    • memory/2148-1-0x0000000000010000-0x00000000000C2000-memory.dmp

      Filesize

      712KB

    • memory/2148-14-0x0000000074350000-0x0000000074A3E000-memory.dmp

      Filesize

      6.9MB

    • memory/2148-0-0x000000007435E000-0x000000007435F000-memory.dmp

      Filesize

      4KB

    • memory/2732-9-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2732-8-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2732-10-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2732-13-0x0000000000400000-0x0000000000428000-memory.dmp

      Filesize

      160KB

    • memory/2732-15-0x0000000000910000-0x0000000000C13000-memory.dmp

      Filesize

      3.0MB

    • memory/2732-16-0x0000000000910000-0x0000000000C13000-memory.dmp

      Filesize

      3.0MB