Analysis

  • max time kernel
    155s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    03-11-2021 19:40

General

  • Target

    RIOSAT_DOC.xlsx

  • Size

    201KB

  • MD5

    4ed0940e6e53d246dae50a1a7dda5f68

  • SHA1

    4439f0cdb3937226cb4015ec4c2df54a36c29f65

  • SHA256

    e6b973beff845a214101c3f4714d32f15112b86a9fbfbd301914063f2e4e5677

  • SHA512

    7f7734d8f9983339f279e95b76ce78743875889e5a1e7951f80e9e984ac34b31312ee0f80682976895e030d0784ec17be5b0ec65536a86b448706979a0f288f9

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

ht08

C2

http://www.septemberstockevent200.com/ht08/

Decoy

joye.club

istanbulemlakgalerisi.online

annikadaniel.love

oooci.com

curebase-test.com

swisstradecenter.com

hacticum.com

centercodebase.com

recbi56ni.com

mmj0115.xyz

sharpstead.com

sprklbeauty.com

progettogenesi.cloud

dolinum.com

amaroqadvisors.com

traininig.com

leewaysvcs.com

nashhomesearch.com

joy1263.com

serkanyamac.com

Signatures

  • Detect Neshta Payload 5 IoCs
  • Modifies system executable filetype association 2 TTPs 1 IoCs
  • Neshta

    Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Uses the VBS compiler for execution 1 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Modifies registry key 1 TTPs 3 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 47 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\RIOSAT_DOC.xlsx
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:428
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1292
  • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
    "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
    1⤵
    • Blocklisted process makes network request
    • Loads dropped DLL
    • Launches Equation Editor
    • Suspicious use of WriteProcessMemory
    PID:836
    • C:\Users\Public\vbc.exe
      "C:\Users\Public\vbc.exe"
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:1164
      • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
        "C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:868
        • C:\Windows\SysWOW64\logagent.exe
          C:\Windows\System32\logagent.exe
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1604
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c ""C:\Users\Public\Trast.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:552
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /K C:\Users\Public\UKO.bat
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:304
            • C:\Windows\SysWOW64\reg.exe
              reg delete hkcu\Environment /v windir /f
              6⤵
              • Modifies registry key
              PID:1120
            • C:\Windows\SysWOW64\reg.exe
              reg add hkcu\Environment /v windir /d "cmd /c start /min C:\Users\Public\KDECO.bat reg delete hkcu\Environment /v windir /f && REM "
              6⤵
              • Modifies registry key
              PID:1484
            • C:\Windows\SysWOW64\schtasks.exe
              schtasks /Run /TN \Microsoft\Windows\DiskCleanup\SilentCleanup /I
              6⤵
                PID:2020
          • C:\Windows\SysWOW64\cmd.exe
            cmd /c ""C:\Users\Public\nest.bat" "
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2040
            • C:\Windows\SysWOW64\reg.exe
              reg delete hkcu\Environment /v windir /f
              5⤵
              • Modifies registry key
              PID:984

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\MICROS~1\Windows\TEMPOR~1\Content.IE5\RHI8KPQK\VBC_1_~1.EXE
      MD5

      30c7103e4ac74802a7c3695736d2592e

      SHA1

      aa151cf41f533688026f84316328a409323ac426

      SHA256

      cda1086841f6d462f662c6b2e643e7d1c4868ea56d848733f3270fa2a780e117

      SHA512

      60668c9f1e48dd99a04d5c6d8158f1412bc19fe3d4d00973a9c61acb3171c73b976430dfc41586825b1347600ee6ff658f14ede153b7c7fe310ff632f84faf35

    • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      c345295004c073b4ffd93d6b1bcbe07b

      SHA1

      38dd21c44fc9a358ad260a98b39f9522a444231f

      SHA256

      674b9499d6502f4e84c89499655645f4bee8b027ed127834f2b354637eb4b253

      SHA512

      918274e570f07a2b8d1f7cd35d529149e7dc039f19181b06d86912c4fad25ead3b1c65f25d236521e07b64e9ffd83fdd0f37b708fed5a109c55d24b314aaa4c0

    • C:\Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      c345295004c073b4ffd93d6b1bcbe07b

      SHA1

      38dd21c44fc9a358ad260a98b39f9522a444231f

      SHA256

      674b9499d6502f4e84c89499655645f4bee8b027ed127834f2b354637eb4b253

      SHA512

      918274e570f07a2b8d1f7cd35d529149e7dc039f19181b06d86912c4fad25ead3b1c65f25d236521e07b64e9ffd83fdd0f37b708fed5a109c55d24b314aaa4c0

    • C:\Users\Public\LIBRAR~1\Qmvtdvov\Qmvtdvov.exe
      MD5

      24aaa6b488ab77b9b4a28c0d0a60141a

      SHA1

      5280ab8f4061fc75921e9a3fdfe67c222c4acef2

      SHA256

      3973f0d23af9f2f090dca5b50d628f41dd5b848157e2470bcd146f3eb6236ea8

      SHA512

      719d3f72fbc148f5240c5d12289a01ce804e7e74bfc7acb104ac5092a4a238f66ed121abb385ddb3b3c1b526c5910f8c9787a2b4af6c27ea133e9194cf25b69c

    • C:\Users\Public\Trast.bat
      MD5

      4068c9f69fcd8a171c67f81d4a952a54

      SHA1

      4d2536a8c28cdcc17465e20d6693fb9e8e713b36

      SHA256

      24222300c78180b50ed1f8361ba63cb27316ec994c1c9079708a51b4a1a9d810

      SHA512

      a64f9319acc51fffd0491c74dcd9c9084c2783b82f95727e4bfe387a8528c6dcf68f11418e88f1e133d115daf907549c86dd7ad866b2a7938add5225fbb2811d

    • C:\Users\Public\UKO.bat
      MD5

      eaf8d967454c3bbddbf2e05a421411f8

      SHA1

      6170880409b24de75c2dc3d56a506fbff7f6622c

      SHA256

      f35f2658455a2e40f151549a7d6465a836c33fa9109e67623916f889849eac56

      SHA512

      fe5be5c673e99f70c93019d01abb0a29dd2ecf25b2d895190ff551f020c28e7d8f99f65007f440f0f76c5bcac343b2a179a94d190c938ea3b9e1197890a412e9

    • C:\Users\Public\nest.bat
      MD5

      8ada51400b7915de2124baaf75e3414c

      SHA1

      1a7b9db12184ab7fd7fce1c383f9670a00adb081

      SHA256

      45aa3957c29865260a78f03eef18ae9aebdbf7bea751ecc88be4a799f2bb46c7

      SHA512

      9afc138157a4565294ca49942579cdb6f5d8084e56f9354738de62b585f4c0fa3e7f2cbc9541827f2084e3ff36c46eed29b46f5dd2444062ffcd05c599992e68

    • C:\Users\Public\vbc.exe
      MD5

      30c7103e4ac74802a7c3695736d2592e

      SHA1

      aa151cf41f533688026f84316328a409323ac426

      SHA256

      cda1086841f6d462f662c6b2e643e7d1c4868ea56d848733f3270fa2a780e117

      SHA512

      60668c9f1e48dd99a04d5c6d8158f1412bc19fe3d4d00973a9c61acb3171c73b976430dfc41586825b1347600ee6ff658f14ede153b7c7fe310ff632f84faf35

    • C:\Users\Public\vbc.exe
      MD5

      30c7103e4ac74802a7c3695736d2592e

      SHA1

      aa151cf41f533688026f84316328a409323ac426

      SHA256

      cda1086841f6d462f662c6b2e643e7d1c4868ea56d848733f3270fa2a780e117

      SHA512

      60668c9f1e48dd99a04d5c6d8158f1412bc19fe3d4d00973a9c61acb3171c73b976430dfc41586825b1347600ee6ff658f14ede153b7c7fe310ff632f84faf35

    • \PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE
      MD5

      9e2b9928c89a9d0da1d3e8f4bd96afa7

      SHA1

      ec66cda99f44b62470c6930e5afda061579cde35

      SHA256

      8899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043

      SHA512

      2ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156

    • \Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      c345295004c073b4ffd93d6b1bcbe07b

      SHA1

      38dd21c44fc9a358ad260a98b39f9522a444231f

      SHA256

      674b9499d6502f4e84c89499655645f4bee8b027ed127834f2b354637eb4b253

      SHA512

      918274e570f07a2b8d1f7cd35d529149e7dc039f19181b06d86912c4fad25ead3b1c65f25d236521e07b64e9ffd83fdd0f37b708fed5a109c55d24b314aaa4c0

    • \Users\Admin\AppData\Local\Temp\3582-490\vbc.exe
      MD5

      c345295004c073b4ffd93d6b1bcbe07b

      SHA1

      38dd21c44fc9a358ad260a98b39f9522a444231f

      SHA256

      674b9499d6502f4e84c89499655645f4bee8b027ed127834f2b354637eb4b253

      SHA512

      918274e570f07a2b8d1f7cd35d529149e7dc039f19181b06d86912c4fad25ead3b1c65f25d236521e07b64e9ffd83fdd0f37b708fed5a109c55d24b314aaa4c0

    • \Users\Public\LIBRAR~1\Qmvtdvov\Qmvtdvov.exe
      MD5

      24aaa6b488ab77b9b4a28c0d0a60141a

      SHA1

      5280ab8f4061fc75921e9a3fdfe67c222c4acef2

      SHA256

      3973f0d23af9f2f090dca5b50d628f41dd5b848157e2470bcd146f3eb6236ea8

      SHA512

      719d3f72fbc148f5240c5d12289a01ce804e7e74bfc7acb104ac5092a4a238f66ed121abb385ddb3b3c1b526c5910f8c9787a2b4af6c27ea133e9194cf25b69c

    • \Users\Public\vbc.exe
      MD5

      30c7103e4ac74802a7c3695736d2592e

      SHA1

      aa151cf41f533688026f84316328a409323ac426

      SHA256

      cda1086841f6d462f662c6b2e643e7d1c4868ea56d848733f3270fa2a780e117

      SHA512

      60668c9f1e48dd99a04d5c6d8158f1412bc19fe3d4d00973a9c61acb3171c73b976430dfc41586825b1347600ee6ff658f14ede153b7c7fe310ff632f84faf35

    • \Users\Public\vbc.exe
      MD5

      30c7103e4ac74802a7c3695736d2592e

      SHA1

      aa151cf41f533688026f84316328a409323ac426

      SHA256

      cda1086841f6d462f662c6b2e643e7d1c4868ea56d848733f3270fa2a780e117

      SHA512

      60668c9f1e48dd99a04d5c6d8158f1412bc19fe3d4d00973a9c61acb3171c73b976430dfc41586825b1347600ee6ff658f14ede153b7c7fe310ff632f84faf35

    • memory/304-82-0x0000000000000000-mapping.dmp
    • memory/428-55-0x000000002FAE1000-0x000000002FAE4000-memory.dmp
      Filesize

      12KB

    • memory/428-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/428-104-0x000000005FFF0000-0x0000000060000000-memory.dmp
      Filesize

      64KB

    • memory/428-56-0x0000000070EB1000-0x0000000070EB3000-memory.dmp
      Filesize

      8KB

    • memory/552-78-0x0000000000000000-mapping.dmp
    • memory/836-58-0x0000000075F41000-0x0000000075F43000-memory.dmp
      Filesize

      8KB

    • memory/868-67-0x0000000000000000-mapping.dmp
    • memory/868-71-0x00000000003E1000-0x00000000003F5000-memory.dmp
      Filesize

      80KB

    • memory/868-70-0x00000000003C0000-0x00000000003C1000-memory.dmp
      Filesize

      4KB

    • memory/984-100-0x0000000000000000-mapping.dmp
    • memory/1120-84-0x0000000000000000-mapping.dmp
    • memory/1164-61-0x0000000000000000-mapping.dmp
    • memory/1292-96-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1292-94-0x0000000000000000-mapping.dmp
    • memory/1292-101-0x00000000004F0000-0x0000000000580000-memory.dmp
      Filesize

      576KB

    • memory/1292-95-0x0000000000300000-0x0000000000306000-memory.dmp
      Filesize

      24KB

    • memory/1292-97-0x0000000000A60000-0x0000000000D63000-memory.dmp
      Filesize

      3.0MB

    • memory/1368-102-0x0000000009960000-0x0000000009AE3000-memory.dmp
      Filesize

      1.5MB

    • memory/1368-91-0x0000000007C60000-0x0000000007E00000-memory.dmp
      Filesize

      1.6MB

    • memory/1484-85-0x0000000000000000-mapping.dmp
    • memory/1604-79-0x0000000000090000-0x0000000000091000-memory.dmp
      Filesize

      4KB

    • memory/1604-80-0x0000000072480000-0x00000000724A9000-memory.dmp
      Filesize

      164KB

    • memory/1604-77-0x0000000000000000-mapping.dmp
    • memory/1604-75-0x0000000000080000-0x0000000000081000-memory.dmp
      Filesize

      4KB

    • memory/1604-90-0x0000000000240000-0x0000000000251000-memory.dmp
      Filesize

      68KB

    • memory/1604-89-0x0000000002120000-0x0000000002423000-memory.dmp
      Filesize

      3.0MB

    • memory/1604-74-0x0000000072480000-0x00000000724A9000-memory.dmp
      Filesize

      164KB

    • memory/2020-86-0x0000000000000000-mapping.dmp
    • memory/2040-98-0x0000000000000000-mapping.dmp