Analysis

  • max time kernel
    1202s
  • max time network
    1203s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    29-08-2021 02:52

General

  • Target

    Booking and Shipping Reference Details.exe

  • Size

    764KB

  • MD5

    261e1d3d96af2d57fabdf9295a6ad987

  • SHA1

    4be2f141e6862bbf8a79bac4900a211008ac6e68

  • SHA256

    468169b4fe61a81e910c9b820d46694ad3e089e7d276831e690f86012db80195

  • SHA512

    0307ea1169f2193c513af63aadb10fa3a3f0c9bae5767997e940085572150e0db8480cbf4a72dc8795e78570250f0342eec768d8eb63c731519f3091ddec9a05

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

u86g

C2

http://www.99356a.com/u86g/

Decoy

agenciaplim.com

fastpage.info

tiantianbd.com

hanedanpirlanta.com

project1accessories.com

rebeccadoumet.com

vrdnfz.com

jeaninesatl.com

isaakwallihconstruction.com

aegis.cloud

tigerandsnow.com

thehappyadventurer.com

ahhazu.com

hiveplushoney.com

k-plan-ning.com

peresvet.one

darkworkcustoms.com

deathbok.com

blackinkswizz.com

077sb.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 27 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2568
    • C:\Users\Admin\AppData\Local\Temp\Booking and Shipping Reference Details.exe
      "C:\Users\Admin\AppData\Local\Temp\Booking and Shipping Reference Details.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Local\Temp\Booking and Shipping Reference Details.exe
        "C:\Users\Admin\AppData\Local\Temp\Booking and Shipping Reference Details.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1356
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3852
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Booking and Shipping Reference Details.exe"
        3⤵
          PID:1564
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:3188
        • C:\Program Files (x86)\Garidu\regsvcavmhadz.exe
          "C:\Program Files (x86)\Garidu\regsvcavmhadz.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3540
          • C:\Program Files (x86)\Garidu\regsvcavmhadz.exe
            "C:\Program Files (x86)\Garidu\regsvcavmhadz.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            PID:2204

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\Garidu\regsvcavmhadz.exe

        MD5

        261e1d3d96af2d57fabdf9295a6ad987

        SHA1

        4be2f141e6862bbf8a79bac4900a211008ac6e68

        SHA256

        468169b4fe61a81e910c9b820d46694ad3e089e7d276831e690f86012db80195

        SHA512

        0307ea1169f2193c513af63aadb10fa3a3f0c9bae5767997e940085572150e0db8480cbf4a72dc8795e78570250f0342eec768d8eb63c731519f3091ddec9a05

      • C:\Program Files (x86)\Garidu\regsvcavmhadz.exe

        MD5

        261e1d3d96af2d57fabdf9295a6ad987

        SHA1

        4be2f141e6862bbf8a79bac4900a211008ac6e68

        SHA256

        468169b4fe61a81e910c9b820d46694ad3e089e7d276831e690f86012db80195

        SHA512

        0307ea1169f2193c513af63aadb10fa3a3f0c9bae5767997e940085572150e0db8480cbf4a72dc8795e78570250f0342eec768d8eb63c731519f3091ddec9a05

      • C:\Program Files (x86)\Garidu\regsvcavmhadz.exe

        MD5

        261e1d3d96af2d57fabdf9295a6ad987

        SHA1

        4be2f141e6862bbf8a79bac4900a211008ac6e68

        SHA256

        468169b4fe61a81e910c9b820d46694ad3e089e7d276831e690f86012db80195

        SHA512

        0307ea1169f2193c513af63aadb10fa3a3f0c9bae5767997e940085572150e0db8480cbf4a72dc8795e78570250f0342eec768d8eb63c731519f3091ddec9a05

      • memory/1012-122-0x0000000009260000-0x00000000092C9000-memory.dmp

        Filesize

        420KB

      • memory/1012-117-0x0000000005940000-0x0000000005941000-memory.dmp

        Filesize

        4KB

      • memory/1012-120-0x0000000009100000-0x0000000009116000-memory.dmp

        Filesize

        88KB

      • memory/1012-121-0x00000000091C0000-0x00000000091C1000-memory.dmp

        Filesize

        4KB

      • memory/1012-114-0x0000000000F10000-0x0000000000F11000-memory.dmp

        Filesize

        4KB

      • memory/1012-123-0x000000000BA40000-0x000000000BA73000-memory.dmp

        Filesize

        204KB

      • memory/1012-118-0x0000000005860000-0x0000000005D5E000-memory.dmp

        Filesize

        5.0MB

      • memory/1012-116-0x0000000005D60000-0x0000000005D61000-memory.dmp

        Filesize

        4KB

      • memory/1012-119-0x00000000059E0000-0x00000000059E1000-memory.dmp

        Filesize

        4KB

      • memory/1356-125-0x000000000041D020-mapping.dmp

      • memory/1356-127-0x00000000009F0000-0x0000000000A00000-memory.dmp

        Filesize

        64KB

      • memory/1356-126-0x00000000012F0000-0x0000000001610000-memory.dmp

        Filesize

        3.1MB

      • memory/1356-124-0x0000000000400000-0x0000000000428000-memory.dmp

        Filesize

        160KB

      • memory/1564-132-0x0000000000000000-mapping.dmp

      • memory/2204-155-0x0000000001190000-0x00000000014B0000-memory.dmp

        Filesize

        3.1MB

      • memory/2204-153-0x000000000041D020-mapping.dmp

      • memory/2568-135-0x0000000006610000-0x000000000673E000-memory.dmp

        Filesize

        1.2MB

      • memory/2568-128-0x00000000064E0000-0x000000000660E000-memory.dmp

        Filesize

        1.2MB

      • memory/3188-149-0x0000027B819A0000-0x0000027B81A7A000-memory.dmp

        Filesize

        872KB

      • memory/3188-148-0x00007FF655CC0000-0x00007FF655D53000-memory.dmp

        Filesize

        588KB

      • memory/3188-147-0x0000000000000000-mapping.dmp

      • memory/3540-136-0x0000000000000000-mapping.dmp

      • memory/3540-144-0x0000000005690000-0x0000000005B8E000-memory.dmp

        Filesize

        5.0MB

      • memory/3852-134-0x0000000003330000-0x00000000033BF000-memory.dmp

        Filesize

        572KB

      • memory/3852-133-0x0000000002F80000-0x00000000032A0000-memory.dmp

        Filesize

        3.1MB

      • memory/3852-130-0x00000000001F0000-0x00000000001FB000-memory.dmp

        Filesize

        44KB

      • memory/3852-131-0x0000000002BA0000-0x0000000002BC8000-memory.dmp

        Filesize

        160KB

      • memory/3852-129-0x0000000000000000-mapping.dmp