Resubmissions

16-08-2021 08:13

210816-g9g5qdtss6 10

16-08-2021 02:37

210816-916qkap392 10

27-07-2021 16:09

210727-16hdt92t9x 10

Analysis

  • max time kernel
    599s
  • max time network
    606s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    16-08-2021 08:13

General

  • Target

    e8af1892a757aa0f0693ce9677e69328.exe

  • Size

    699KB

  • MD5

    e8af1892a757aa0f0693ce9677e69328

  • SHA1

    f79c8d60ac27830351d257f2dbe00a72ea7b889c

  • SHA256

    1ea32ffb0d84a4c157e12e6a3bd153a3cf3bb878ec2ef474fb547ee6fc7e9cc4

  • SHA512

    f6f8bf083a5f04c450aa574b803d20eefe5dd1dc423b6ad502a7b7926967f0bd5e79424ce3876018bfb8ef04e0eb801ce6415c3156cccd9c15a5a678bd305ae1

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

b8eu

C2

http://www.yummylipz.net/b8eu/

Decoy

ppslide.com

savorysinsation.com

camilaediego2021.com

rstrunk.net

xianshikanxiyang.club

1borefruit.com

ay-danil.club

xamangxcoax.club

waltonunderwood.com

laurabissell.com

laurawmorrow.com

albamauto.net

usamlb.com

theoyays.com

freeitproject.com

jijiservice.com

ukcarpetclean.com

wc399.com

xn--pskrtmebeton-dlbc.online

exclusivemerchantsolutions.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Xloader Payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Obfuscated with Agile.Net obfuscator 2 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\e8af1892a757aa0f0693ce9677e69328.exe
      "C:\Users\Admin\AppData\Local\Temp\e8af1892a757aa0f0693ce9677e69328.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1172
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
          PID:1436
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:2296
        • C:\Program Files (x86)\Aazkdwh\6ljsxl03rz8.exe
          "C:\Program Files (x86)\Aazkdwh\6ljsxl03rz8.exe"
          2⤵
          • Executes dropped EXE
          PID:2240

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Aazkdwh\6ljsxl03rz8.exe
        MD5

        6a673bfc3b67ae9782cb31af2f234c68

        SHA1

        7544e89566d91e84e3cd437b9a073e5f6b56566e

        SHA256

        978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

        SHA512

        72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

      • C:\Program Files (x86)\Aazkdwh\6ljsxl03rz8.exe
        MD5

        6a673bfc3b67ae9782cb31af2f234c68

        SHA1

        7544e89566d91e84e3cd437b9a073e5f6b56566e

        SHA256

        978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

        SHA512

        72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        MD5

        6a673bfc3b67ae9782cb31af2f234c68

        SHA1

        7544e89566d91e84e3cd437b9a073e5f6b56566e

        SHA256

        978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

        SHA512

        72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

      • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
        MD5

        6a673bfc3b67ae9782cb31af2f234c68

        SHA1

        7544e89566d91e84e3cd437b9a073e5f6b56566e

        SHA256

        978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

        SHA512

        72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

      • memory/1172-132-0x00000000007F0000-0x0000000000800000-memory.dmp
        Filesize

        64KB

      • memory/1172-129-0x000000000041D030-mapping.dmp
      • memory/1172-131-0x0000000001040000-0x0000000001360000-memory.dmp
        Filesize

        3.1MB

      • memory/1172-128-0x0000000000400000-0x0000000000428000-memory.dmp
        Filesize

        160KB

      • memory/1436-136-0x0000000000000000-mapping.dmp
      • memory/2240-147-0x0000000005110000-0x0000000005111000-memory.dmp
        Filesize

        4KB

      • memory/2240-142-0x0000000000000000-mapping.dmp
      • memory/2240-145-0x00000000008F0000-0x00000000008F1000-memory.dmp
        Filesize

        4KB

      • memory/2240-146-0x0000000005080000-0x0000000005081000-memory.dmp
        Filesize

        4KB

      • memory/2296-148-0x0000000000000000-mapping.dmp
      • memory/2296-149-0x00007FF7EF640000-0x00007FF7EF6D3000-memory.dmp
        Filesize

        588KB

      • memory/2296-150-0x000001A72B2B0000-0x000001A72B377000-memory.dmp
        Filesize

        796KB

      • memory/3008-124-0x0000000006FC0000-0x0000000006FC1000-memory.dmp
        Filesize

        4KB

      • memory/3008-123-0x0000000007000000-0x0000000007001000-memory.dmp
        Filesize

        4KB

      • memory/3008-116-0x0000000005C40000-0x0000000005C41000-memory.dmp
        Filesize

        4KB

      • memory/3008-127-0x0000000009EA0000-0x0000000009EA1000-memory.dmp
        Filesize

        4KB

      • memory/3008-126-0x00000000078A0000-0x00000000078AB000-memory.dmp
        Filesize

        44KB

      • memory/3008-117-0x00000000057E0000-0x00000000057E1000-memory.dmp
        Filesize

        4KB

      • memory/3008-118-0x0000000005880000-0x0000000005881000-memory.dmp
        Filesize

        4KB

      • memory/3008-119-0x0000000006140000-0x0000000006141000-memory.dmp
        Filesize

        4KB

      • memory/3008-120-0x0000000005740000-0x0000000005C3E000-memory.dmp
        Filesize

        5.0MB

      • memory/3008-122-0x0000000006F20000-0x0000000006F41000-memory.dmp
        Filesize

        132KB

      • memory/3008-125-0x0000000005740000-0x0000000005C3E000-memory.dmp
        Filesize

        5.0MB

      • memory/3008-114-0x0000000000E50000-0x0000000000E51000-memory.dmp
        Filesize

        4KB

      • memory/3020-141-0x0000000005D10000-0x0000000005E3B000-memory.dmp
        Filesize

        1.2MB

      • memory/3020-133-0x0000000002420000-0x000000000256B000-memory.dmp
        Filesize

        1.3MB

      • memory/3844-140-0x0000000004960000-0x00000000049EF000-memory.dmp
        Filesize

        572KB

      • memory/3844-139-0x0000000004B00000-0x0000000004E20000-memory.dmp
        Filesize

        3.1MB

      • memory/3844-137-0x0000000000E20000-0x0000000000E39000-memory.dmp
        Filesize

        100KB

      • memory/3844-138-0x0000000000960000-0x0000000000988000-memory.dmp
        Filesize

        160KB

      • memory/3844-134-0x0000000000000000-mapping.dmp