Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    11-02-2022 11:11

General

  • Target

    Alis sifarisi.exe

  • Size

    1.0MB

  • MD5

    54c39236d174c27d217736cd049d8bbd

  • SHA1

    832f5c5c4cbf2b4f888f319654cf002176bbb916

  • SHA256

    2179647ebf96503deb5fae78827c5d99757f2926f0226cb5a6e4181e2f0c1a07

  • SHA512

    1df01d52dc6965d5b42c3f03887b01c0fdd1593666e1733d8776d4a64f22253c062e6f1e29fc403f2217547f96962955fe7733b23b55b0f5fd3a5774acec5c7a

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

pvxz

Decoy

imt-token.club

abravewayocen.online

shcloudcar.com

mshoppingworld.online

ncgf08.xyz

stuinfo.xyz

wesavetheplanetofficial.com

tourbox.xyz

believeinyourselftraining.com

jsboyat.com

aaeconomy.info

9etmorea.info

purosepeti7.com

goticketly.com

pinkmemorypt.com

mylifewellnesscentre.com

iridina.online

petrestore.online

neema.xyz

novelfooditalia.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:1412
    • C:\Users\Admin\AppData\Local\Temp\Alis sifarisi.exe
      "C:\Users\Admin\AppData\Local\Temp\Alis sifarisi.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1740
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:432
    • C:\Windows\SysWOW64\wuapp.exe
      "C:\Windows\SysWOW64\wuapp.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1840
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\DpiScaling.exe"
        3⤵
          PID:2040
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1752
        • C:\Program Files (x86)\Anng4l\certmgr7nmd1n.exe
          "C:\Program Files (x86)\Anng4l\certmgr7nmd1n.exe"
          2⤵
          • Executes dropped EXE
          PID:1216
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:268

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Anng4l\certmgr7nmd1n.exe
          MD5

          8c9da2e414e713d3daff1f18223ae11b

          SHA1

          9ef90d73fa4d852be9b803a5e990cc908aab8a94

          SHA256

          60b2a9d679f14f92e284ad21395da53652db137e45ec6473d9033e6c3fe6a37f

          SHA512

          adc712d94e8226729b336a348e9376d68f1e006871e7a0151f312e125e96226e74bc75e87efd709e31c5cb322a9ed68e2912c9fd03bd6e6800f5900f712105d7

        • C:\Program Files (x86)\Anng4l\certmgr7nmd1n.exe
          MD5

          8c9da2e414e713d3daff1f18223ae11b

          SHA1

          9ef90d73fa4d852be9b803a5e990cc908aab8a94

          SHA256

          60b2a9d679f14f92e284ad21395da53652db137e45ec6473d9033e6c3fe6a37f

          SHA512

          adc712d94e8226729b336a348e9376d68f1e006871e7a0151f312e125e96226e74bc75e87efd709e31c5cb322a9ed68e2912c9fd03bd6e6800f5900f712105d7

        • memory/432-67-0x0000000000210000-0x0000000000221000-memory.dmp
          Filesize

          68KB

        • memory/432-58-0x0000000072480000-0x00000000724A9000-memory.dmp
          Filesize

          164KB

        • memory/432-59-0x0000000000080000-0x0000000000081000-memory.dmp
          Filesize

          4KB

        • memory/432-62-0x0000000072480000-0x00000000724A9000-memory.dmp
          Filesize

          164KB

        • memory/432-63-0x0000000000090000-0x0000000000091000-memory.dmp
          Filesize

          4KB

        • memory/432-64-0x0000000072480000-0x00000000724A9000-memory.dmp
          Filesize

          164KB

        • memory/432-66-0x000000007249D000-0x000000007249E000-memory.dmp
          Filesize

          4KB

        • memory/432-65-0x0000000002190000-0x0000000002493000-memory.dmp
          Filesize

          3.0MB

        • memory/1216-77-0x0000000072A71000-0x0000000072A73000-memory.dmp
          Filesize

          8KB

        • memory/1412-68-0x0000000006A20000-0x0000000006B60000-memory.dmp
          Filesize

          1.2MB

        • memory/1412-73-0x0000000008D80000-0x0000000008E9B000-memory.dmp
          Filesize

          1.1MB

        • memory/1740-55-0x0000000000250000-0x0000000000251000-memory.dmp
          Filesize

          4KB

        • memory/1740-53-0x0000000075D61000-0x0000000075D63000-memory.dmp
          Filesize

          8KB

        • memory/1740-56-0x0000000000406000-0x0000000000407000-memory.dmp
          Filesize

          4KB

        • memory/1840-69-0x00000000002F0000-0x00000000002FB000-memory.dmp
          Filesize

          44KB

        • memory/1840-70-0x00000000000F0000-0x0000000000119000-memory.dmp
          Filesize

          164KB

        • memory/1840-71-0x0000000001EE0000-0x00000000021E3000-memory.dmp
          Filesize

          3.0MB

        • memory/1840-72-0x0000000001CC0000-0x0000000001D50000-memory.dmp
          Filesize

          576KB