Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240412-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240412-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-04-2024 08:14

General

  • Target

    scan-0001098.exe

  • Size

    235KB

  • MD5

    24147a6909f47667067a4598f50fdfc4

  • SHA1

    29d9b920365fd2092e2d2f2ebac159882e80cb8c

  • SHA256

    32ece49c018110f307142a5eff7d169e75731b059fbf81ac26f82aab4111b8c8

  • SHA512

    e3ba24bd4fd68dee1ce7a17ece6a92e81ad3b0d9b272612562b5d5c1d101b8ce45c3193be4ffe38c808affab595a7e84eb704675efd7410b3d4513ade84494cd

  • SSDEEP

    6144:Nb8EsldTMwKkBkdES/Qlhbkw7auRZKhnyN:NQEc+9kGXQbbkUP3N

Score
10/10

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

noi6

Decoy

yow.today

rkdreamcreations.com

etheriumtech.com

stretchwrench.com

kiddiecruise.com

stickforward.com

videocineproduccion.com

roofinginamerica.com

amarillasnuevomexico.com

armfieldmillerripley.com

macyburn.club

lvbaoshan.com

shopshelponline.com

thebunnybrands.com

newsxplor.com

momunani.com

rebelnqueen.com

tusguitarras.com

nexab2b.com

e3office.express

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3548
    • C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe
      "C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:4984
      • C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe
        "C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1256
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2272
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\scan-0001098.exe"
        3⤵
          PID:3084

    Network

    MITRE ATT&CK Matrix ATT&CK v13

    Execution

    Command and Scripting Interpreter

    1
    T1059

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1256-10-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1256-3-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1256-11-0x0000000000F10000-0x0000000000F20000-memory.dmp
      Filesize

      64KB

    • memory/1256-4-0x0000000000F50000-0x000000000129A000-memory.dmp
      Filesize

      3.3MB

    • memory/1256-6-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1256-7-0x0000000000980000-0x0000000000990000-memory.dmp
      Filesize

      64KB

    • memory/2272-13-0x0000000000100000-0x000000000010B000-memory.dmp
      Filesize

      44KB

    • memory/2272-20-0x0000000001280000-0x000000000130F000-memory.dmp
      Filesize

      572KB

    • memory/2272-17-0x0000000000CB0000-0x0000000000CD9000-memory.dmp
      Filesize

      164KB

    • memory/2272-16-0x00000000013A0000-0x00000000016EA000-memory.dmp
      Filesize

      3.3MB

    • memory/2272-15-0x0000000000CB0000-0x0000000000CD9000-memory.dmp
      Filesize

      164KB

    • memory/2272-14-0x0000000000100000-0x000000000010B000-memory.dmp
      Filesize

      44KB

    • memory/3548-12-0x0000000008A20000-0x0000000008B22000-memory.dmp
      Filesize

      1.0MB

    • memory/3548-19-0x00000000088E0000-0x0000000008A19000-memory.dmp
      Filesize

      1.2MB

    • memory/3548-8-0x00000000088E0000-0x0000000008A19000-memory.dmp
      Filesize

      1.2MB

    • memory/3548-21-0x0000000008A20000-0x0000000008B22000-memory.dmp
      Filesize

      1.0MB

    • memory/3548-23-0x0000000009020000-0x00000000091A9000-memory.dmp
      Filesize

      1.5MB

    • memory/3548-25-0x0000000009020000-0x00000000091A9000-memory.dmp
      Filesize

      1.5MB

    • memory/3548-28-0x0000000009020000-0x00000000091A9000-memory.dmp
      Filesize

      1.5MB

    • memory/4984-2-0x0000000000BC0000-0x0000000000BC2000-memory.dmp
      Filesize

      8KB

    • memory/4984-1-0x0000000000A00000-0x0000000000B00000-memory.dmp
      Filesize

      1024KB