Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    08-09-2021 15:08

General

  • Target

    Order 2021-600918.js

  • Size

    311KB

  • MD5

    f875ce20d9473d5dd74d2e0382fb32ba

  • SHA1

    a9b75554d7cb9eae3f06c2b9f3b7cf60617b32d8

  • SHA256

    b71e66c2f3dd88356df6c1bb0cab806156e91bed324c376b45cae58ce051ceff

  • SHA512

    1eccb095f0bd41fb28879a726d8257b3a30cc487efa33fe24f2be2899596ee99bc54179d7003493aec50e55f6e6beac77616a9a8d9c3d80e4cb4a0244c33c4fe

Malware Config

Extracted

Family

xloader

Version

2.3

Campaign

wqos

C2

http://www.shdbwl188.com/wqos/

Decoy

nobis.one

firecrestfineart.com

zhongqiaolw.com

healthcaremovement.com

amothersloveliberates.com

maskscafe.com

dkukkmk.icu

realmindofmitch.com

cranes-crossing.com

deeplyrootedplants.com

doodlesbakery.com

xiaomagu.com

lactase-enzym.com

comprartecnologia.com

making-my-new-normal.com

ruksamin.com

inforko.com

2mblueprint.com

pinkfang.com

100daysofbush.com

Signatures

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 18 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Windows\system32\wscript.exe
      wscript.exe "C:\Users\Admin\AppData\Local\Temp\Order 2021-600918.js"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:664
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\zIMOUAQYhg.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:3152
      • C:\Users\Admin\AppData\Local\Temp\bin.exe
        "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3696
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:2264

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\bin.exe

    MD5

    63f3a93c472be113725e951e40696642

    SHA1

    15477f7333a4ad56227bc61049c5eb5451ac73c7

    SHA256

    92e653a855a5495cc862ed79ee39aa6620b9b0b08948e89f866b07debba1b2f8

    SHA512

    c155c01b90f80ab7125138e79a03a07b3699a00d1953653a00ac2f29d06d496bc9633119f3885f36f615313630cd1283822b12f38d7446a698b430584e238549

  • C:\Users\Admin\AppData\Local\Temp\bin.exe

    MD5

    63f3a93c472be113725e951e40696642

    SHA1

    15477f7333a4ad56227bc61049c5eb5451ac73c7

    SHA256

    92e653a855a5495cc862ed79ee39aa6620b9b0b08948e89f866b07debba1b2f8

    SHA512

    c155c01b90f80ab7125138e79a03a07b3699a00d1953653a00ac2f29d06d496bc9633119f3885f36f615313630cd1283822b12f38d7446a698b430584e238549

  • C:\Users\Admin\AppData\Roaming\zIMOUAQYhg.js

    MD5

    797f97b46b0f42d7a26810b7b2e04cc9

    SHA1

    141b0a609e3fe9e4695ad0dfd905be24414287ab

    SHA256

    2a15292e70c7b6edbfb44ae1347debf9ab31bb3296b7cd3619fda0f9abf0d89d

    SHA512

    c5173a980edc2230d9673e2c5729b6829c4130e80a14eb7efd7f0e41bc5a3f01b559fb67b5be191e0a309f0b04abf2c52b632e873307471569a07f995774a27d

  • memory/2264-123-0x00000000001C0000-0x00000000005FF000-memory.dmp

    Filesize

    4.2MB

  • memory/2264-122-0x0000000000000000-mapping.dmp

  • memory/2264-124-0x0000000000140000-0x0000000000168000-memory.dmp

    Filesize

    160KB

  • memory/2264-125-0x0000000004800000-0x0000000004B20000-memory.dmp

    Filesize

    3.1MB

  • memory/2264-126-0x0000000004520000-0x00000000045AF000-memory.dmp

    Filesize

    572KB

  • memory/3024-121-0x0000000005E30000-0x0000000005F49000-memory.dmp

    Filesize

    1.1MB

  • memory/3024-127-0x00000000065E0000-0x0000000006702000-memory.dmp

    Filesize

    1.1MB

  • memory/3152-114-0x0000000000000000-mapping.dmp

  • memory/3696-116-0x0000000000000000-mapping.dmp

  • memory/3696-119-0x0000000001140000-0x0000000001460000-memory.dmp

    Filesize

    3.1MB

  • memory/3696-120-0x0000000000CC0000-0x0000000000CD0000-memory.dmp

    Filesize

    64KB