Resubmissions

27-09-2021 07:53

210927-jq1a3sfhfj 10

20-09-2021 04:19

210920-exhmdsfdhr 10

Analysis

  • max time kernel
    1200s
  • max time network
    1196s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    27-09-2021 07:53

General

  • Target

    t0ID2yWRERNRIz4.exe

  • Size

    818KB

  • MD5

    2fa809111f6953a10bcae39ef3f57aa7

  • SHA1

    9415a9c252e39776162749c9131d96274cd6cac9

  • SHA256

    7b4c1bf9a15a419080fe02866aa26f162f79d5e01763c6af5915b07988556223

  • SHA512

    adb6b340237a62af5fced4c819bfa92317e15a4062dab379d97a1b2ecd9e5ace9fca9330872f7d4f01c2a0b96035d9a69a376d7f7c812fece8584326447933b9

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

gjeh

C2

http://www.getaudionow.com/gjeh/

Decoy

carmator.com

bsbqrp.com

siemens-mp.com

dunnfloorcoverings.com

cpassminimedicalschools.info

howtodesignyourhomeoffice.com

famliytaste.com

freesocialmarketing.com

jejuhaenyeo.net

tradebot.icu

arzug.com

carrefour-solucoes.online

ladyom.com

aoironote.com

newmexicocarwreckattorney.com

wealthpatternsllc.net

thinkpinkalicous.com

prajapati.company

bjhwky.com

jsdigitalekuns.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 12 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 31 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\t0ID2yWRERNRIz4.exe
      "C:\Users\Admin\AppData\Local\Temp\t0ID2yWRERNRIz4.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1360
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1812
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        2⤵
        • Blocklisted process makes network request
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1072
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
          3⤵
            PID:1752
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:1488
          • C:\Program Files (x86)\V2d3\gdisfv.exe
            "C:\Program Files (x86)\V2d3\gdisfv.exe"
            2⤵
            • Executes dropped EXE
            PID:1064

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\V2d3\gdisfv.exe
          MD5

          9af17c8393f0970ee5136bd3ffa27001

          SHA1

          4b285b72c1a11285a25f31f2597e090da6bbc049

          SHA256

          71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

          SHA512

          b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

        • C:\Program Files (x86)\V2d3\gdisfv.exe
          MD5

          9af17c8393f0970ee5136bd3ffa27001

          SHA1

          4b285b72c1a11285a25f31f2597e090da6bbc049

          SHA256

          71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

          SHA512

          b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

        • memory/1064-79-0x0000000000370000-0x0000000000371000-memory.dmp
          Filesize

          4KB

        • memory/1064-77-0x0000000001140000-0x0000000001141000-memory.dmp
          Filesize

          4KB

        • memory/1064-74-0x0000000000000000-mapping.dmp
        • memory/1072-68-0x0000000000E20000-0x0000000000E34000-memory.dmp
          Filesize

          80KB

        • memory/1072-71-0x0000000002240000-0x0000000002543000-memory.dmp
          Filesize

          3.0MB

        • memory/1072-72-0x0000000000A00000-0x0000000000A90000-memory.dmp
          Filesize

          576KB

        • memory/1072-66-0x0000000000000000-mapping.dmp
        • memory/1072-67-0x0000000076581000-0x0000000076583000-memory.dmp
          Filesize

          8KB

        • memory/1072-69-0x00000000000D0000-0x00000000000F9000-memory.dmp
          Filesize

          164KB

        • memory/1144-55-0x0000000004CE0000-0x0000000004CE1000-memory.dmp
          Filesize

          4KB

        • memory/1144-56-0x0000000000A20000-0x0000000000A3D000-memory.dmp
          Filesize

          116KB

        • memory/1144-57-0x0000000005690000-0x00000000056F6000-memory.dmp
          Filesize

          408KB

        • memory/1144-58-0x0000000000C60000-0x0000000000C96000-memory.dmp
          Filesize

          216KB

        • memory/1144-53-0x0000000001000000-0x0000000001001000-memory.dmp
          Filesize

          4KB

        • memory/1392-65-0x0000000007410000-0x0000000008766000-memory.dmp
          Filesize

          19.3MB

        • memory/1392-73-0x00000000094A0000-0x00000000095B8000-memory.dmp
          Filesize

          1.1MB

        • memory/1392-62-0x0000000007410000-0x0000000008766000-memory.dmp
          Filesize

          19.3MB

        • memory/1488-80-0x0000000000000000-mapping.dmp
        • memory/1488-82-0x0000000000060000-0x0000000000175000-memory.dmp
          Filesize

          1.1MB

        • memory/1488-81-0x000000013F280000-0x000000013F313000-memory.dmp
          Filesize

          588KB

        • memory/1752-70-0x0000000000000000-mapping.dmp
        • memory/1812-60-0x000000000041D460-mapping.dmp
        • memory/1812-59-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1812-64-0x0000000000320000-0x0000000000331000-memory.dmp
          Filesize

          68KB

        • memory/1812-63-0x0000000000180000-0x0000000000191000-memory.dmp
          Filesize

          68KB

        • memory/1812-61-0x00000000009C0000-0x0000000000CC3000-memory.dmp
          Filesize

          3.0MB