Analysis

  • max time kernel
    145s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    21-04-2024 08:14

General

  • Target

    scan-0001098.exe

  • Size

    235KB

  • MD5

    24147a6909f47667067a4598f50fdfc4

  • SHA1

    29d9b920365fd2092e2d2f2ebac159882e80cb8c

  • SHA256

    32ece49c018110f307142a5eff7d169e75731b059fbf81ac26f82aab4111b8c8

  • SHA512

    e3ba24bd4fd68dee1ce7a17ece6a92e81ad3b0d9b272612562b5d5c1d101b8ce45c3193be4ffe38c808affab595a7e84eb704675efd7410b3d4513ade84494cd

  • SSDEEP

    6144:Nb8EsldTMwKkBkdES/Qlhbkw7auRZKhnyN:NQEc+9kGXQbbkUP3N

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

noi6

Decoy

yow.today

rkdreamcreations.com

etheriumtech.com

stretchwrench.com

kiddiecruise.com

stickforward.com

videocineproduccion.com

roofinginamerica.com

amarillasnuevomexico.com

armfieldmillerripley.com

macyburn.club

lvbaoshan.com

shopshelponline.com

thebunnybrands.com

newsxplor.com

momunani.com

rebelnqueen.com

tusguitarras.com

nexab2b.com

e3office.express

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1204
    • C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe
      "C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe
        "C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2076
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe"
        3⤵
        • Deletes itself
        PID:2308

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1204-8-0x00000000051E0000-0x000000000537C000-memory.dmp
    Filesize

    1.6MB

  • memory/1204-17-0x00000000051E0000-0x000000000537C000-memory.dmp
    Filesize

    1.6MB

  • memory/1204-15-0x0000000000010000-0x0000000000020000-memory.dmp
    Filesize

    64KB

  • memory/2076-11-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/2076-9-0x0000000000540000-0x0000000000556000-memory.dmp
    Filesize

    88KB

  • memory/2076-10-0x0000000000540000-0x0000000000556000-memory.dmp
    Filesize

    88KB

  • memory/2076-12-0x0000000001DC0000-0x00000000020C3000-memory.dmp
    Filesize

    3.0MB

  • memory/2076-13-0x0000000000080000-0x00000000000A9000-memory.dmp
    Filesize

    164KB

  • memory/2076-14-0x0000000001CF0000-0x0000000001D7F000-memory.dmp
    Filesize

    572KB

  • memory/2748-1-0x0000000000130000-0x0000000000230000-memory.dmp
    Filesize

    1024KB

  • memory/2748-2-0x00000000000C0000-0x00000000000C2000-memory.dmp
    Filesize

    8KB

  • memory/2752-6-0x00000000000B0000-0x00000000000C0000-memory.dmp
    Filesize

    64KB

  • memory/2752-7-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB

  • memory/2752-4-0x0000000000850000-0x0000000000B53000-memory.dmp
    Filesize

    3.0MB

  • memory/2752-3-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB