Resubmissions

09-02-2022 08:59

220209-kxyaqshhgp 10

09-02-2022 00:39

220209-azs4paghcn 10

Analysis

  • max time kernel
    1799s
  • max time network
    1803s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220113
  • submitted
    09-02-2022 08:59

General

  • Target

    ORDER_71.exe

  • Size

    262KB

  • MD5

    78c4e0ee7d553496e9123839c8fa144c

  • SHA1

    ff5f5c69e406500adff16452c71bf4e0c1322455

  • SHA256

    3c281d772b25ef5bed141574c037855aee8321aec2f3dd272c3526af659795dc

  • SHA512

    832989a7bcbe37d6664934e1d57e95ed55cc8eb635e962bae8070e4bc68f6a4707789105069c2bf8277d1154a0034b7fcf7807c38e66820810e63e5475a948ae

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

uar3

Decoy

sgadvocats.com

mjscannabus.com

hilldaley.com

ksdollhouse.com

hotgiftboutique.com

purebloodsmeet.com

relaunched.info

cap-glove.com

productcollection.store

fulikyy.xyz

remoteaviationjobs.com

bestcleancrystal.com

virtualorganizationpartner.com

bookgocar.com

hattuafhv.quest

makonigroup.com

officecom-myaccount.com

malgorzata-lac.com

e-learningeducators.com

hygilaur.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Xloader Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\ORDER_71.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER_71.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4464
      • C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
        C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3824
        • C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
          C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4484
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:2672
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:1796
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:3160
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:2556
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:4584
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:4728
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:4544
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:2580
                    • C:\Windows\SysWOW64\WWAHost.exe
                      "C:\Windows\SysWOW64\WWAHost.exe"
                      2⤵
                      • Adds policy Run key to start application
                      • Suspicious use of SetThreadContext
                      • Drops file in Program Files directory
                      • Modifies Internet Explorer settings
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1676
                      • C:\Windows\SysWOW64\cmd.exe
                        /c del "C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe"
                        3⤵
                          PID:364
                        • C:\Windows\SysWOW64\cmd.exe
                          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                          3⤵
                            PID:4196
                          • C:\Program Files\Mozilla Firefox\Firefox.exe
                            "C:\Program Files\Mozilla Firefox\Firefox.exe"
                            3⤵
                              PID:4600
                          • C:\Program Files (x86)\Oytw\pp7mtvln.exe
                            "C:\Program Files (x86)\Oytw\pp7mtvln.exe"
                            2⤵
                            • Executes dropped EXE
                            • Suspicious use of SetThreadContext
                            • Suspicious use of WriteProcessMemory
                            PID:3952
                            • C:\Program Files (x86)\Oytw\pp7mtvln.exe
                              "C:\Program Files (x86)\Oytw\pp7mtvln.exe"
                              3⤵
                              • Executes dropped EXE
                              PID:4272
                        • C:\Windows\system32\svchost.exe
                          C:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv
                          1⤵
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:3052
                        • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
                          C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
                          1⤵
                          • Drops file in Windows directory
                          • Suspicious use of AdjustPrivilegeToken
                          PID:2348

                        Network

                        MITRE ATT&CK Matrix ATT&CK v6

                        Persistence

                        Registry Run Keys / Startup Folder

                        1
                        T1060

                        Defense Evasion

                        Modify Registry

                        2
                        T1112

                        Credential Access

                        Credentials in Files

                        1
                        T1081

                        Discovery

                        System Information Discovery

                        1
                        T1082

                        Collection

                        Data from Local System

                        1
                        T1005

                        Replay Monitor

                        Loading Replay Monitor...

                        Downloads

                        • C:\Program Files (x86)\Oytw\pp7mtvln.exe
                          MD5

                          26e62de1fe0425c1d68603a6a4b01e9a

                          SHA1

                          a33d313b71cde30b9ed98e05ca730af8c1bd866c

                          SHA256

                          ec520fe2a81e72ce6b55eff28f6ff1034472033c1e3bff24227a3feacb53c1c4

                          SHA512

                          600d3656cd55caa2b7089fcbd51c1fc8a8155c8f4aab0157ac701be8c922b804da725142faffdb1a03929adb2242ee132fe24b3b9a35be735f1fddcd7f9374a5

                        • C:\Program Files (x86)\Oytw\pp7mtvln.exe
                          MD5

                          26e62de1fe0425c1d68603a6a4b01e9a

                          SHA1

                          a33d313b71cde30b9ed98e05ca730af8c1bd866c

                          SHA256

                          ec520fe2a81e72ce6b55eff28f6ff1034472033c1e3bff24227a3feacb53c1c4

                          SHA512

                          600d3656cd55caa2b7089fcbd51c1fc8a8155c8f4aab0157ac701be8c922b804da725142faffdb1a03929adb2242ee132fe24b3b9a35be735f1fddcd7f9374a5

                        • C:\Program Files (x86)\Oytw\pp7mtvln.exe
                          MD5

                          26e62de1fe0425c1d68603a6a4b01e9a

                          SHA1

                          a33d313b71cde30b9ed98e05ca730af8c1bd866c

                          SHA256

                          ec520fe2a81e72ce6b55eff28f6ff1034472033c1e3bff24227a3feacb53c1c4

                          SHA512

                          600d3656cd55caa2b7089fcbd51c1fc8a8155c8f4aab0157ac701be8c922b804da725142faffdb1a03929adb2242ee132fe24b3b9a35be735f1fddcd7f9374a5

                        • C:\Users\Admin\AppData\Local\Temp\6iaja8xtuva5dlgmmjc
                          MD5

                          c3b88214d035490f382d6647ca213ac6

                          SHA1

                          45b0416a531c9a6151042a30540b4477c46942e5

                          SHA256

                          5356c21a6a1deaff488ede8c6980f137c7c62bb9b69932bae8878a9ed0e5d544

                          SHA512

                          761f0ee4cbca60dc29971bd56fc7bb8e58f27b2b926508e95ad6c123165dd3dadeeded248a940e24877da3af2ee06997a29150321202692fe8364e446acb00d9

                        • C:\Users\Admin\AppData\Local\Temp\DB1
                          MD5

                          b608d407fc15adea97c26936bc6f03f6

                          SHA1

                          953e7420801c76393902c0d6bb56148947e41571

                          SHA256

                          b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

                          SHA512

                          cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

                        • C:\Users\Admin\AppData\Local\Temp\cplevtq
                          MD5

                          b14b9fbe5cc63338a273c2ad9b4ffe5a

                          SHA1

                          b9ea1cf326922d02196bd82bca889082e232a004

                          SHA256

                          27d7fc5358df80c0fc40f86c8378242c9465a656bb7925c6d35e2c79144e9a13

                          SHA512

                          74066926b21eb5200ec7e5345d29afa453f61cd329331bc1dfbcae1a5c4c2248484854cf66ae3148b1b602ed72c3dfca437913411daf05ef2e24b96e7e890508

                        • C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
                          MD5

                          26e62de1fe0425c1d68603a6a4b01e9a

                          SHA1

                          a33d313b71cde30b9ed98e05ca730af8c1bd866c

                          SHA256

                          ec520fe2a81e72ce6b55eff28f6ff1034472033c1e3bff24227a3feacb53c1c4

                          SHA512

                          600d3656cd55caa2b7089fcbd51c1fc8a8155c8f4aab0157ac701be8c922b804da725142faffdb1a03929adb2242ee132fe24b3b9a35be735f1fddcd7f9374a5

                        • C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
                          MD5

                          26e62de1fe0425c1d68603a6a4b01e9a

                          SHA1

                          a33d313b71cde30b9ed98e05ca730af8c1bd866c

                          SHA256

                          ec520fe2a81e72ce6b55eff28f6ff1034472033c1e3bff24227a3feacb53c1c4

                          SHA512

                          600d3656cd55caa2b7089fcbd51c1fc8a8155c8f4aab0157ac701be8c922b804da725142faffdb1a03929adb2242ee132fe24b3b9a35be735f1fddcd7f9374a5

                        • C:\Users\Admin\AppData\Local\Temp\hfcppzuj.exe
                          MD5

                          26e62de1fe0425c1d68603a6a4b01e9a

                          SHA1

                          a33d313b71cde30b9ed98e05ca730af8c1bd866c

                          SHA256

                          ec520fe2a81e72ce6b55eff28f6ff1034472033c1e3bff24227a3feacb53c1c4

                          SHA512

                          600d3656cd55caa2b7089fcbd51c1fc8a8155c8f4aab0157ac701be8c922b804da725142faffdb1a03929adb2242ee132fe24b3b9a35be735f1fddcd7f9374a5

                        • memory/1676-148-0x00000000011C0000-0x0000000001250000-memory.dmp
                          Filesize

                          576KB

                        • memory/1676-142-0x0000000000670000-0x000000000074C000-memory.dmp
                          Filesize

                          880KB

                        • memory/1676-143-0x00000000001A0000-0x00000000001C9000-memory.dmp
                          Filesize

                          164KB

                        • memory/1676-144-0x0000000001470000-0x00000000017BA000-memory.dmp
                          Filesize

                          3.3MB

                        • memory/2620-149-0x00000000034A0000-0x000000000353B000-memory.dmp
                          Filesize

                          620KB

                        • memory/2620-139-0x0000000008E10000-0x0000000008F9B000-memory.dmp
                          Filesize

                          1.5MB

                        • memory/3052-145-0x00000172A2D20000-0x00000172A2D30000-memory.dmp
                          Filesize

                          64KB

                        • memory/3052-146-0x00000172A2D80000-0x00000172A2D90000-memory.dmp
                          Filesize

                          64KB

                        • memory/3052-147-0x00000172A5450000-0x00000172A5454000-memory.dmp
                          Filesize

                          16KB

                        • memory/3052-159-0x00000172A5370000-0x00000172A5371000-memory.dmp
                          Filesize

                          4KB

                        • memory/3052-157-0x00000172A53B0000-0x00000172A53B1000-memory.dmp
                          Filesize

                          4KB

                        • memory/3052-156-0x00000172A5470000-0x00000172A5474000-memory.dmp
                          Filesize

                          16KB

                        • memory/4272-155-0x00000000009D0000-0x0000000000D1A000-memory.dmp
                          Filesize

                          3.3MB

                        • memory/4484-140-0x000000000041D000-0x000000000041E000-memory.dmp
                          Filesize

                          4KB

                        • memory/4484-134-0x0000000000400000-0x0000000000429000-memory.dmp
                          Filesize

                          164KB

                        • memory/4484-137-0x0000000000960000-0x0000000000CAA000-memory.dmp
                          Filesize

                          3.3MB

                        • memory/4484-138-0x0000000000400000-0x0000000000429000-memory.dmp
                          Filesize

                          164KB

                        • memory/4484-141-0x00000000008C0000-0x00000000008D1000-memory.dmp
                          Filesize

                          68KB