Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    14-12-2021 13:15

General

  • Target

    Order Confirmation nr. 2021-O-1274.xlsx

  • Size

    797KB

  • MD5

    f2c6d74d9faa8dd958dbd50101a95792

  • SHA1

    489079097bc05626dccd8d6079e925079305ca43

  • SHA256

    0f4df99356c9f5c4d67b60d3a7d352782aa83ea82057716eb706d480c8616b26

  • SHA512

    43183d5b1bd787789ffd40d323b1f236c246ddabcbde366671c34d7b733fb94c470839c9810d7cd4f0338ea235052b7c860e9ec1b15a1b8c414e7aec3b86ed2e

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

fqiq

C2

http://www.esyscoloradosprings.com/fqiq/

Decoy

driventow.com

ipatchwork.today

bolder.equipment

seal-brother.com

mountlaketerraceapartments.com

weeden.xyz

sanlifalan.com

athafood.com

isshinn1.com

creationslazzaroni.com

eclecticrenaissancewoman.com

satellitephonstore.com

cotchildcare.com

yamacorp.digital

ff4cuno43.xyz

quicksticks.community

govindfinance.com

farmersfirstseed.com

megacinema.club

tablescaperendezvous4two.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Xloader Payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 4 IoCs
  • Uses the VBS compiler for execution 1 TTPs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 12 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1380
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Order Confirmation nr. 2021-O-1274.xlsx"
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:1320
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1724
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:1628
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\SysWOW64\cmd.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1728
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Public\vbc.exe"
            3⤵
              PID:2016
        • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
          "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
          1⤵
          • Blocklisted process makes network request
          • Loads dropped DLL
          • Launches Equation Editor
          • Suspicious use of WriteProcessMemory
          PID:776
          • C:\Users\Public\vbc.exe
            "C:\Users\Public\vbc.exe"
            2⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetThreadContext
            • Suspicious use of WriteProcessMemory
            PID:1060
            • C:\Users\Public\vbc.exe
              "C:\Users\Public\vbc.exe"
              3⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1632

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Scripting

        1
        T1064

        Exploitation for Client Execution

        1
        T1203

        Defense Evasion

        Scripting

        1
        T1064

        Modify Registry

        1
        T1112

        Discovery

        System Information Discovery

        2
        T1082

        Query Registry

        1
        T1012

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Public\vbc.exe
          MD5

          02e92cd81e96503e161af2816aceeca6

          SHA1

          ae3badc4e7dc0cac71d93e12b9b6349afd12eab5

          SHA256

          2da5894ddf4a54f105d7a36e1e8940b00313b16ccaa74f270c542ed140247386

          SHA512

          ae53bf892eb23e49f951d95e6089044a00d24fcc97e251717358ec55b53cb7500720fdc1ea554ed402c58dfa9d2995b9f1cd974d1f80dc655cf34203647c9ea4

        • C:\Users\Public\vbc.exe
          MD5

          02e92cd81e96503e161af2816aceeca6

          SHA1

          ae3badc4e7dc0cac71d93e12b9b6349afd12eab5

          SHA256

          2da5894ddf4a54f105d7a36e1e8940b00313b16ccaa74f270c542ed140247386

          SHA512

          ae53bf892eb23e49f951d95e6089044a00d24fcc97e251717358ec55b53cb7500720fdc1ea554ed402c58dfa9d2995b9f1cd974d1f80dc655cf34203647c9ea4

        • C:\Users\Public\vbc.exe
          MD5

          02e92cd81e96503e161af2816aceeca6

          SHA1

          ae3badc4e7dc0cac71d93e12b9b6349afd12eab5

          SHA256

          2da5894ddf4a54f105d7a36e1e8940b00313b16ccaa74f270c542ed140247386

          SHA512

          ae53bf892eb23e49f951d95e6089044a00d24fcc97e251717358ec55b53cb7500720fdc1ea554ed402c58dfa9d2995b9f1cd974d1f80dc655cf34203647c9ea4

        • \Users\Admin\AppData\Local\Temp\nso1BEB.tmp\jgreidrjri.dll
          MD5

          78764ab85602e39626fd7f3d2c9373ba

          SHA1

          c371ccdaf7a1698e8b670be64e4e0cd27ccd1cc8

          SHA256

          18cdad7be023dd68dbdedc9eca90535f3a1ed81636d3383098eb56a7307f13a4

          SHA512

          e4a2e3af904d6bd9e8d5d7ea0016fa2b4fa5320d9079c772813a95920406e0f03a1ea81533a5152a48667ef48eabc9f3792ac918b127c494edbb3b7c5fec7076

        • \Users\Public\vbc.exe
          MD5

          02e92cd81e96503e161af2816aceeca6

          SHA1

          ae3badc4e7dc0cac71d93e12b9b6349afd12eab5

          SHA256

          2da5894ddf4a54f105d7a36e1e8940b00313b16ccaa74f270c542ed140247386

          SHA512

          ae53bf892eb23e49f951d95e6089044a00d24fcc97e251717358ec55b53cb7500720fdc1ea554ed402c58dfa9d2995b9f1cd974d1f80dc655cf34203647c9ea4

        • \Users\Public\vbc.exe
          MD5

          02e92cd81e96503e161af2816aceeca6

          SHA1

          ae3badc4e7dc0cac71d93e12b9b6349afd12eab5

          SHA256

          2da5894ddf4a54f105d7a36e1e8940b00313b16ccaa74f270c542ed140247386

          SHA512

          ae53bf892eb23e49f951d95e6089044a00d24fcc97e251717358ec55b53cb7500720fdc1ea554ed402c58dfa9d2995b9f1cd974d1f80dc655cf34203647c9ea4

        • \Users\Public\vbc.exe
          MD5

          02e92cd81e96503e161af2816aceeca6

          SHA1

          ae3badc4e7dc0cac71d93e12b9b6349afd12eab5

          SHA256

          2da5894ddf4a54f105d7a36e1e8940b00313b16ccaa74f270c542ed140247386

          SHA512

          ae53bf892eb23e49f951d95e6089044a00d24fcc97e251717358ec55b53cb7500720fdc1ea554ed402c58dfa9d2995b9f1cd974d1f80dc655cf34203647c9ea4

        • memory/776-58-0x0000000074B21000-0x0000000074B23000-memory.dmp
          Filesize

          8KB

        • memory/1060-62-0x0000000000000000-mapping.dmp
        • memory/1320-57-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/1320-81-0x000000005FFF0000-0x0000000060000000-memory.dmp
          Filesize

          64KB

        • memory/1320-55-0x000000002FD01000-0x000000002FD04000-memory.dmp
          Filesize

          12KB

        • memory/1320-56-0x0000000070C81000-0x0000000070C83000-memory.dmp
          Filesize

          8KB

        • memory/1380-73-0x0000000007200000-0x00000000073A9000-memory.dmp
          Filesize

          1.7MB

        • memory/1380-80-0x0000000008F10000-0x0000000009045000-memory.dmp
          Filesize

          1.2MB

        • memory/1632-68-0x000000000041D4B0-mapping.dmp
        • memory/1632-72-0x0000000000580000-0x0000000000591000-memory.dmp
          Filesize

          68KB

        • memory/1632-71-0x0000000000700000-0x0000000000A03000-memory.dmp
          Filesize

          3.0MB

        • memory/1632-67-0x0000000000400000-0x0000000000429000-memory.dmp
          Filesize

          164KB

        • memory/1728-74-0x0000000000000000-mapping.dmp
        • memory/1728-75-0x000000004A410000-0x000000004A45C000-memory.dmp
          Filesize

          304KB

        • memory/1728-78-0x0000000001ED0000-0x00000000021D3000-memory.dmp
          Filesize

          3.0MB

        • memory/1728-76-0x00000000000C0000-0x00000000000E9000-memory.dmp
          Filesize

          164KB

        • memory/1728-79-0x0000000001E20000-0x0000000001EB0000-memory.dmp
          Filesize

          576KB

        • memory/2016-77-0x0000000000000000-mapping.dmp