Analysis

  • max time kernel
    146s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    25-11-2021 15:50

General

  • Target

    Se adjunta el pedido, proforma.exe

  • Size

    714KB

  • MD5

    deea7525a547ed7a9ef6c81b04478f3e

  • SHA1

    b29c935913a55c9bad3979d05d97a6ebda871604

  • SHA256

    413e8df7f149aa643aaa1ef70e953ab2112827b652f1cf05b6420ed6a119962d

  • SHA512

    ddb161a25bdc6465ddba19c8781773006e8cbf7b8e909aae20eb4cc577b085c72d75bed40b0d4ab2363003759a344b1aad2235381ab3c10043b3e47e2ee9f139

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

euv4

C2

http://www.rematedeldia.com/euv4/

Decoy

anniebapartments.com

hagenbicycles.com

herbalist101.com

southerncorrosion.net

kuechenpruefer.com

tajniezdrzi.quest

segurofunerarioar.com

boardsandbeamsdecor.com

alifdanismanlik.com

pkem.top

mddc.clinic

handejqr.com

crux-at.com

awp.email

hugsforbubbs.com

cielotherepy.com

turkcuyuz.com

teamidc.com

lankasirinspa.com

68135.online

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 3 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\Se adjunta el pedido, proforma.exe
      "C:\Users\Admin\AppData\Local\Temp\Se adjunta el pedido, proforma.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1072
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1748
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1496
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\DpiScaling.exe"
        3⤵
          PID:1480
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1976
        • C:\Program Files (x86)\G-zp8d\ThumbCacheqjstczi.exe
          "C:\Program Files (x86)\G-zp8d\ThumbCacheqjstczi.exe"
          2⤵
          • Executes dropped EXE
          PID:1820
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:1572

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        3
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\G-zp8d\ThumbCacheqjstczi.exe
          MD5

          8c9da2e414e713d3daff1f18223ae11b

          SHA1

          9ef90d73fa4d852be9b803a5e990cc908aab8a94

          SHA256

          60b2a9d679f14f92e284ad21395da53652db137e45ec6473d9033e6c3fe6a37f

          SHA512

          adc712d94e8226729b336a348e9376d68f1e006871e7a0151f312e125e96226e74bc75e87efd709e31c5cb322a9ed68e2912c9fd03bd6e6800f5900f712105d7

        • C:\Program Files (x86)\G-zp8d\ThumbCacheqjstczi.exe
          MD5

          8c9da2e414e713d3daff1f18223ae11b

          SHA1

          9ef90d73fa4d852be9b803a5e990cc908aab8a94

          SHA256

          60b2a9d679f14f92e284ad21395da53652db137e45ec6473d9033e6c3fe6a37f

          SHA512

          adc712d94e8226729b336a348e9376d68f1e006871e7a0151f312e125e96226e74bc75e87efd709e31c5cb322a9ed68e2912c9fd03bd6e6800f5900f712105d7

        • memory/1072-56-0x0000000000301000-0x0000000000315000-memory.dmp
          Filesize

          80KB

        • memory/1072-57-0x0000000000230000-0x0000000000231000-memory.dmp
          Filesize

          4KB

        • memory/1072-55-0x0000000075801000-0x0000000075803000-memory.dmp
          Filesize

          8KB

        • memory/1360-68-0x0000000004290000-0x0000000004348000-memory.dmp
          Filesize

          736KB

        • memory/1360-76-0x0000000006880000-0x0000000006960000-memory.dmp
          Filesize

          896KB

        • memory/1480-71-0x0000000000000000-mapping.dmp
        • memory/1496-74-0x00000000020D0000-0x00000000023D3000-memory.dmp
          Filesize

          3.0MB

        • memory/1496-72-0x0000000000A30000-0x0000000000B34000-memory.dmp
          Filesize

          1.0MB

        • memory/1496-75-0x0000000001F40000-0x0000000001FD0000-memory.dmp
          Filesize

          576KB

        • memory/1496-69-0x0000000000000000-mapping.dmp
        • memory/1496-73-0x00000000000C0000-0x00000000000E9000-memory.dmp
          Filesize

          164KB

        • memory/1748-66-0x0000000001F80000-0x0000000002283000-memory.dmp
          Filesize

          3.0MB

        • memory/1748-67-0x0000000000280000-0x0000000000291000-memory.dmp
          Filesize

          68KB

        • memory/1748-64-0x00000000000D0000-0x00000000000D1000-memory.dmp
          Filesize

          4KB

        • memory/1748-65-0x0000000072480000-0x00000000724A9000-memory.dmp
          Filesize

          164KB

        • memory/1748-61-0x0000000000000000-mapping.dmp
        • memory/1748-59-0x00000000000C0000-0x00000000000C1000-memory.dmp
          Filesize

          4KB

        • memory/1748-58-0x0000000072480000-0x00000000724A9000-memory.dmp
          Filesize

          164KB

        • memory/1820-77-0x0000000000000000-mapping.dmp
        • memory/1820-80-0x0000000072F01000-0x0000000072F03000-memory.dmp
          Filesize

          8KB