Resubmissions

24-09-2021 03:40

210924-d8m6ksffgp 10

24-09-2021 01:13

210924-bldyaafed2 10

Analysis

  • max time kernel
    599s
  • max time network
    599s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    24-09-2021 03:40

General

  • Target

    QUOTE PRICE.exe

  • Size

    558KB

  • MD5

    3a35017603b428f692151484ad54ded0

  • SHA1

    ac071c363f33e2a28aaffc77e5a34642d8246fe0

  • SHA256

    45f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3

  • SHA512

    6a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

m6rs

C2

http://www.litediv.com/m6rs/

Decoy

globalsovereignbank.com

ktnrape.xyz

churchybulletin.com

ddyla.com

imatge.cat

iwholesalestore.com

cultivapro.club

ibcfcl.com

refurbisheddildo.com

killerinktnpasumo4.xyz

mdphotoart.com

smi-ity.com

stanprolearningcenter.com

companyintelapp.com

tacticarc.com

soolls.com

gra68.net

cedricettori.digital

mossobuy.com

way2liv.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Xloader Payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe
      "C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:796
      • C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe
        "C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3732
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:3976
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:1876
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:632
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:572
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:3268
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:576
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:412
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:2864
                    • C:\Windows\SysWOW64\netsh.exe
                      "C:\Windows\SysWOW64\netsh.exe"
                      2⤵
                      • Adds policy Run key to start application
                      • Suspicious use of SetThreadContext
                      • Drops file in Program Files directory
                      • Modifies Internet Explorer settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2628
                      • C:\Windows\SysWOW64\cmd.exe
                        /c del "C:\Users\Admin\AppData\Local\Temp\QUOTE PRICE.exe"
                        3⤵
                          PID:1020
                        • C:\Program Files\Mozilla Firefox\Firefox.exe
                          "C:\Program Files\Mozilla Firefox\Firefox.exe"
                          3⤵
                            PID:1164
                        • C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe
                          "C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe"
                          2⤵
                          • Executes dropped EXE
                          • Suspicious use of SetThreadContext
                          • Suspicious use of WriteProcessMemory
                          PID:2528
                          • C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe
                            "C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe"
                            3⤵
                            • Executes dropped EXE
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3544

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Persistence

                      Registry Run Keys / Startup Folder

                      1
                      T1060

                      Defense Evasion

                      Modify Registry

                      2
                      T1112

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe
                        MD5

                        3a35017603b428f692151484ad54ded0

                        SHA1

                        ac071c363f33e2a28aaffc77e5a34642d8246fe0

                        SHA256

                        45f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3

                        SHA512

                        6a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d

                      • C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe
                        MD5

                        3a35017603b428f692151484ad54ded0

                        SHA1

                        ac071c363f33e2a28aaffc77e5a34642d8246fe0

                        SHA256

                        45f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3

                        SHA512

                        6a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d

                      • C:\Program Files (x86)\Gofrp\-zhyvyl3zix.exe
                        MD5

                        3a35017603b428f692151484ad54ded0

                        SHA1

                        ac071c363f33e2a28aaffc77e5a34642d8246fe0

                        SHA256

                        45f5e2a682896ac3380522e26a0398b8112bafc42948666c9fecafa3dcab69e3

                        SHA512

                        6a2c113565aca37d63de00cdd59354400e901bb731d35e53a42951463662374dec5dfb83d109f059b59733abaf3c0f2057a87c22f69b2d738af37b6f19409d8d

                      • memory/796-123-0x0000000007B50000-0x0000000007B8A000-memory.dmp
                        Filesize

                        232KB

                      • memory/796-119-0x00000000051E0000-0x00000000051E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/796-120-0x00000000052C0000-0x00000000052DD000-memory.dmp
                        Filesize

                        116KB

                      • memory/796-121-0x00000000078A0000-0x00000000078A1000-memory.dmp
                        Filesize

                        4KB

                      • memory/796-122-0x0000000007AE0000-0x0000000007B49000-memory.dmp
                        Filesize

                        420KB

                      • memory/796-114-0x00000000007E0000-0x00000000007E1000-memory.dmp
                        Filesize

                        4KB

                      • memory/796-118-0x00000000051B0000-0x0000000005242000-memory.dmp
                        Filesize

                        584KB

                      • memory/796-117-0x00000000052F0000-0x00000000052F1000-memory.dmp
                        Filesize

                        4KB

                      • memory/796-116-0x00000000057F0000-0x00000000057F1000-memory.dmp
                        Filesize

                        4KB

                      • memory/1020-130-0x0000000000000000-mapping.dmp
                      • memory/1164-147-0x00007FF639090000-0x00007FF639123000-memory.dmp
                        Filesize

                        588KB

                      • memory/1164-148-0x000002E960250000-0x000002E9603CF000-memory.dmp
                        Filesize

                        1.5MB

                      • memory/1164-146-0x0000000000000000-mapping.dmp
                      • memory/2528-136-0x0000000000000000-mapping.dmp
                      • memory/2528-145-0x0000000005610000-0x0000000005B0E000-memory.dmp
                        Filesize

                        5.0MB

                      • memory/2628-131-0x0000000001600000-0x000000000161E000-memory.dmp
                        Filesize

                        120KB

                      • memory/2628-133-0x0000000003AE0000-0x0000000003E00000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/2628-134-0x0000000003930000-0x00000000039C0000-memory.dmp
                        Filesize

                        576KB

                      • memory/2628-132-0x0000000001150000-0x0000000001179000-memory.dmp
                        Filesize

                        164KB

                      • memory/2628-129-0x0000000000000000-mapping.dmp
                      • memory/3024-128-0x0000000005CB0000-0x0000000005DAC000-memory.dmp
                        Filesize

                        1008KB

                      • memory/3024-135-0x0000000005E30000-0x0000000005F43000-memory.dmp
                        Filesize

                        1.1MB

                      • memory/3544-153-0x000000000041D3D0-mapping.dmp
                      • memory/3544-155-0x00000000016F0000-0x0000000001A10000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/3732-127-0x00000000013B0000-0x000000000145E000-memory.dmp
                        Filesize

                        696KB

                      • memory/3732-126-0x0000000001920000-0x0000000001C40000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/3732-125-0x000000000041D3D0-mapping.dmp
                      • memory/3732-124-0x0000000000400000-0x0000000000429000-memory.dmp
                        Filesize

                        164KB