Analysis

  • max time kernel
    151s
  • max time network
    156s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    14-10-2021 10:06

General

  • Target

    CHIANG LAAN ship particular.xlsx

  • Size

    332KB

  • MD5

    51d669feccb183a01b42156ae4048a1f

  • SHA1

    dbefe524757e949e2d9a65d3b65667706f66b7cd

  • SHA256

    df630d27aed47b1a28ab1e184814f0f0bf83e2b81d83cee8beaddcc1ea25a79e

  • SHA512

    f9e33f32842e2d156d82d83e2b8348277c577836ba04b306b15d897bf75a664ca3fc3b8238cd04f31e96f5e62d765616baee9540e309ca5c4ee80807abc8ea90

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

bntn

C2

http://www.forex-fm.online/bntn/

Decoy

pollynfertility.com

frayahanson.com

longrunconsultancy.com

influencerimpactacademy.com

kentislandeats.com

71zkck.biz

835641.com

sklepmeki.store

lauradanielphotography.com

betnubhelp.com

invoicefunder.com

reignbeautycompany.com

eclipsegl.com

zacharyparkerporward5.com

alexiamalan.top

xn--299akkrtr22f.com

telex.business

pingsportsbet.com

fountainspringsrehab.com

intelbloodstock.com

Signatures

  • Detect Neshta Payload 7 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\CHIANG LAAN ship particular.xlsx"
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2012
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1692
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe"
        3⤵
          PID:1584
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:672
      • C:\Users\Public\vbc.exe
        "C:\Users\Public\vbc.exe"
        2⤵
        • Modifies system executable filetype association
        • Executes dropped EXE
        • Loads dropped DLL
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:952
        • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
          "C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
            "C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1992

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\K8CH4PHC\VBC_1_~1.EXE
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      33d3b8285711ffe807b50251ccd9c90f

      SHA1

      d4470e56f20b27fe1fe86a73b25db67641028183

      SHA256

      337e3b1c42b7da40a9bddfb17c346621dcb9b367e7b656ffdaf4f594a41e49c5

      SHA512

      e95c9da513fb6292576a499df804d2c6020d2f2e267e98243dae04db0c62dcfaa0c99612a9ccc225006d58b5f3f60c2a315a676fc80547cf7f84b893a6aa4ed9

    • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      33d3b8285711ffe807b50251ccd9c90f

      SHA1

      d4470e56f20b27fe1fe86a73b25db67641028183

      SHA256

      337e3b1c42b7da40a9bddfb17c346621dcb9b367e7b656ffdaf4f594a41e49c5

      SHA512

      e95c9da513fb6292576a499df804d2c6020d2f2e267e98243dae04db0c62dcfaa0c99612a9ccc225006d58b5f3f60c2a315a676fc80547cf7f84b893a6aa4ed9

    • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      33d3b8285711ffe807b50251ccd9c90f

      SHA1

      d4470e56f20b27fe1fe86a73b25db67641028183

      SHA256

      337e3b1c42b7da40a9bddfb17c346621dcb9b367e7b656ffdaf4f594a41e49c5

      SHA512

      e95c9da513fb6292576a499df804d2c6020d2f2e267e98243dae04db0c62dcfaa0c99612a9ccc225006d58b5f3f60c2a315a676fc80547cf7f84b893a6aa4ed9

    • C:\Users\Public\vbc.exe
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • C:\Users\Public\vbc.exe
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      33d3b8285711ffe807b50251ccd9c90f

      SHA1

      d4470e56f20b27fe1fe86a73b25db67641028183

      SHA256

      337e3b1c42b7da40a9bddfb17c346621dcb9b367e7b656ffdaf4f594a41e49c5

      SHA512

      e95c9da513fb6292576a499df804d2c6020d2f2e267e98243dae04db0c62dcfaa0c99612a9ccc225006d58b5f3f60c2a315a676fc80547cf7f84b893a6aa4ed9

    • \Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      33d3b8285711ffe807b50251ccd9c90f

      SHA1

      d4470e56f20b27fe1fe86a73b25db67641028183

      SHA256

      337e3b1c42b7da40a9bddfb17c346621dcb9b367e7b656ffdaf4f594a41e49c5

      SHA512

      e95c9da513fb6292576a499df804d2c6020d2f2e267e98243dae04db0c62dcfaa0c99612a9ccc225006d58b5f3f60c2a315a676fc80547cf7f84b893a6aa4ed9

    • \Users\Public\vbc.exe
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • \Users\Public\vbc.exe
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • \Users\Public\vbc.exe
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • \Users\Public\vbc.exe
      MD5

      da7b4c213039524dd2cd661cb20e62ae

      SHA1

      81ad9e9a3d24242fa7619ad23bb6eed117672a3d

      SHA256

      7d9a7c06ad6bdf4b58d325900a940f3bf830862d108c8cf58d3d77982b87f8c2

      SHA512

      fb55d71a64138bc17f5e7a0c8f6496ddeeb0a156270a1de4b8c0bcee9920a46fef0beba34f1bd0a9d589e5a49ad9d1803b71245a9ec28414c956c594886555af

    • memory/672-57-0x0000000075C11000-0x0000000075C13000-memory.dmp
      Filesize

      8KB

    • memory/952-62-0x0000000000000000-mapping.dmp
    • memory/1384-94-0x00000000060D0000-0x000000000617E000-memory.dmp
      Filesize

      696KB

    • memory/1384-87-0x0000000007320000-0x000000000749D000-memory.dmp
      Filesize

      1.5MB

    • memory/1584-89-0x0000000000000000-mapping.dmp
    • memory/1648-74-0x0000000001170000-0x0000000001171000-memory.dmp
      Filesize

      4KB

    • memory/1648-77-0x0000000004EA0000-0x0000000004EEB000-memory.dmp
      Filesize

      300KB

    • memory/1648-67-0x0000000000000000-mapping.dmp
    • memory/1648-76-0x00000000006A0000-0x00000000006A5000-memory.dmp
      Filesize

      20KB

    • memory/1648-70-0x00000000011D0000-0x00000000011D1000-memory.dmp
      Filesize

      4KB

    • memory/1692-88-0x0000000000000000-mapping.dmp
    • memory/1692-93-0x0000000002020000-0x00000000020B0000-memory.dmp
      Filesize

      576KB

    • memory/1692-90-0x00000000000E0000-0x00000000000E9000-memory.dmp
      Filesize

      36KB

    • memory/1692-91-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1692-92-0x0000000002120000-0x0000000002423000-memory.dmp
      Filesize

      3.0MB

    • memory/1992-80-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1992-86-0x0000000000190000-0x00000000001A1000-memory.dmp
      Filesize

      68KB

    • memory/1992-85-0x00000000009E0000-0x0000000000CE3000-memory.dmp
      Filesize

      3.0MB

    • memory/1992-82-0x000000000041D490-mapping.dmp
    • memory/1992-81-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1992-79-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/2012-54-0x000000002F671000-0x000000002F674000-memory.dmp
      Filesize

      12KB

    • memory/2012-55-0x0000000071281000-0x0000000071283000-memory.dmp
      Filesize

      8KB

    • memory/2012-56-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/2012-95-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB