Resubmissions

27-09-2021 07:53

210927-jq1a3sfhfj 10

20-09-2021 04:19

210920-exhmdsfdhr 10

Analysis

  • max time kernel
    1200s
  • max time network
    1202s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-09-2021 07:53

General

  • Target

    t0ID2yWRERNRIz4.exe

  • Size

    818KB

  • MD5

    2fa809111f6953a10bcae39ef3f57aa7

  • SHA1

    9415a9c252e39776162749c9131d96274cd6cac9

  • SHA256

    7b4c1bf9a15a419080fe02866aa26f162f79d5e01763c6af5915b07988556223

  • SHA512

    adb6b340237a62af5fced4c819bfa92317e15a4062dab379d97a1b2ecd9e5ace9fca9330872f7d4f01c2a0b96035d9a69a376d7f7c812fece8584326447933b9

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

gjeh

C2

http://www.getaudionow.com/gjeh/

Decoy

carmator.com

bsbqrp.com

siemens-mp.com

dunnfloorcoverings.com

cpassminimedicalschools.info

howtodesignyourhomeoffice.com

famliytaste.com

freesocialmarketing.com

jejuhaenyeo.net

tradebot.icu

arzug.com

carrefour-solucoes.online

ladyom.com

aoironote.com

newmexicocarwreckattorney.com

wealthpatternsllc.net

thinkpinkalicous.com

prajapati.company

bjhwky.com

jsdigitalekuns.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Xloader Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 9 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 25 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\t0ID2yWRERNRIz4.exe
      "C:\Users\Admin\AppData\Local\Temp\t0ID2yWRERNRIz4.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:628
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3812
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3768
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1244
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:4032
        • C:\Program Files (x86)\B0dfl\d8tpkrdfl.exe
          "C:\Program Files (x86)\B0dfl\d8tpkrdfl.exe"
          2⤵
          • Executes dropped EXE
          PID:3104

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Program Files (x86)\B0dfl\d8tpkrdfl.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • C:\Program Files (x86)\B0dfl\d8tpkrdfl.exe
        MD5

        9af17c8393f0970ee5136bd3ffa27001

        SHA1

        4b285b72c1a11285a25f31f2597e090da6bbc049

        SHA256

        71d6a7a3fe5f8dc878cd5bdeca0e09177efb85c01e9a8a10a95262cabefaa019

        SHA512

        b90f7de7d5ce72dccb264c7ba609e173c529b9d99ed9a63f88632bc58b1a994bbb727365f519c73b979f8918bd6de3c39a9f0347eb3a4bccdce4b2772a6516a3

      • memory/628-123-0x0000000007AF0000-0x0000000007B56000-memory.dmp
        Filesize

        408KB

      • memory/628-116-0x0000000005200000-0x0000000005201000-memory.dmp
        Filesize

        4KB

      • memory/628-118-0x0000000004D00000-0x0000000004D01000-memory.dmp
        Filesize

        4KB

      • memory/628-120-0x0000000005A10000-0x0000000005A11000-memory.dmp
        Filesize

        4KB

      • memory/628-121-0x0000000005DD0000-0x0000000005DED000-memory.dmp
        Filesize

        116KB

      • memory/628-122-0x00000000078B0000-0x00000000078B1000-memory.dmp
        Filesize

        4KB

      • memory/628-114-0x0000000000150000-0x0000000000151000-memory.dmp
        Filesize

        4KB

      • memory/628-124-0x0000000007BF0000-0x0000000007C26000-memory.dmp
        Filesize

        216KB

      • memory/628-117-0x0000000004C40000-0x0000000004C41000-memory.dmp
        Filesize

        4KB

      • memory/628-119-0x0000000004CF0000-0x0000000004CF1000-memory.dmp
        Filesize

        4KB

      • memory/1244-131-0x0000000000000000-mapping.dmp
      • memory/2996-129-0x00000000053F0000-0x0000000005567000-memory.dmp
        Filesize

        1.5MB

      • memory/2996-136-0x0000000005570000-0x00000000056EE000-memory.dmp
        Filesize

        1.5MB

      • memory/3104-137-0x0000000000000000-mapping.dmp
      • memory/3104-143-0x0000000004CC0000-0x0000000004CC1000-memory.dmp
        Filesize

        4KB

      • memory/3104-142-0x0000000004CD0000-0x0000000004CD1000-memory.dmp
        Filesize

        4KB

      • memory/3104-141-0x0000000000A40000-0x0000000000A41000-memory.dmp
        Filesize

        4KB

      • memory/3104-140-0x0000000000290000-0x0000000000291000-memory.dmp
        Filesize

        4KB

      • memory/3768-130-0x0000000000000000-mapping.dmp
      • memory/3768-135-0x00000000054B0000-0x0000000005540000-memory.dmp
        Filesize

        576KB

      • memory/3768-133-0x0000000004DD0000-0x0000000004DF9000-memory.dmp
        Filesize

        164KB

      • memory/3768-134-0x0000000005000000-0x000000000514A000-memory.dmp
        Filesize

        1.3MB

      • memory/3768-132-0x0000000000180000-0x000000000018A000-memory.dmp
        Filesize

        40KB

      • memory/3812-127-0x0000000001080000-0x00000000013A0000-memory.dmp
        Filesize

        3.1MB

      • memory/3812-128-0x0000000000C20000-0x0000000000D6A000-memory.dmp
        Filesize

        1.3MB

      • memory/3812-126-0x000000000041D460-mapping.dmp
      • memory/3812-125-0x0000000000400000-0x0000000000429000-memory.dmp
        Filesize

        164KB

      • memory/4032-145-0x00007FF645F20000-0x00007FF645FB3000-memory.dmp
        Filesize

        588KB

      • memory/4032-144-0x0000000000000000-mapping.dmp
      • memory/4032-146-0x000001E675770000-0x000001E675814000-memory.dmp
        Filesize

        656KB