Analysis

  • max time kernel
    156s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    16-02-2022 18:34

General

  • Target

    DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe

  • Size

    30KB

  • MD5

    c2ed847cba51543076504a7150261f22

  • SHA1

    93e063e8f777b42cab7f7ed8fa45a2397942dead

  • SHA256

    dfe742ea984310b86ce1d553b87e63f4cdefcf8485b7c860438234377a10a358

  • SHA512

    4dca34f7a0c0ecf2018de5a0e2ba5a9145cfdac508dafa1f5de5fad4072703f6621587b164a742d094cb557e8cedba5630cd7477fbf355a6311ac457c0cb5670

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

po6r

Decoy

jnhuichuangxin.com

mubashir.art

extol.design

doyyindh.xyz

milanoautoexperts.com

4thefringe.com

453511.com

sellathonautocredit.com

velgian.com

6672pk.com

wodeluzhou.com

sumiyoshiku-hizaita.xyz

imoveldeprimeira.com

dgjssp.com

endokc.com

side-clicks.com

cashndashfinancial.com

vanhemelryck.info

agamitrading.com

woofgang.xyz

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 3 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 55 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2436
    • C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3080
      • C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe
        "C:\Users\Admin\AppData\Local\Temp\DHL - OVERDUE ACCOUNT NOTICE - 1301474408.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:3864
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      PID:920
  • C:\Windows\system32\MusNotifyIcon.exe
    %systemroot%\system32\MusNotifyIcon.exe NotifyTrayIcon 13
    1⤵
    • Checks processor information in registry
    PID:432
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k NetworkService -p
    1⤵
    • Drops file in Windows directory
    • Modifies data under HKEY_USERS
    PID:3384
  • C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe
    C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding
    1⤵
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    PID:2632

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/920-143-0x0000000004B90000-0x0000000004C20000-memory.dmp
    Filesize

    576KB

  • memory/920-142-0x0000000004CB0000-0x0000000004FFA000-memory.dmp
    Filesize

    3.3MB

  • memory/920-141-0x0000000002E40000-0x0000000002E69000-memory.dmp
    Filesize

    164KB

  • memory/920-140-0x0000000000200000-0x000000000020C000-memory.dmp
    Filesize

    48KB

  • memory/2436-139-0x0000000002A50000-0x0000000002B16000-memory.dmp
    Filesize

    792KB

  • memory/2436-144-0x0000000007900000-0x0000000007A5F000-memory.dmp
    Filesize

    1.4MB

  • memory/3080-133-0x000000000BFE0000-0x000000000C072000-memory.dmp
    Filesize

    584KB

  • memory/3080-130-0x00000000746FE000-0x00000000746FF000-memory.dmp
    Filesize

    4KB

  • memory/3080-132-0x0000000005660000-0x0000000005661000-memory.dmp
    Filesize

    4KB

  • memory/3080-131-0x0000000000CD0000-0x0000000000CDE000-memory.dmp
    Filesize

    56KB

  • memory/3864-138-0x0000000001260000-0x0000000001271000-memory.dmp
    Filesize

    68KB

  • memory/3864-137-0x000000000041D000-0x000000000041E000-memory.dmp
    Filesize

    4KB

  • memory/3864-135-0x00000000012F0000-0x000000000163A000-memory.dmp
    Filesize

    3.3MB

  • memory/3864-134-0x0000000000400000-0x0000000000429000-memory.dmp
    Filesize

    164KB