Analysis

  • max time kernel
    4294214s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220310-en
  • submitted
    08-04-2022 08:30

General

  • Target

    fiyat talebi.exe

  • Size

    242KB

  • MD5

    cd5a1f00e5069978e2265c76b1ddf25d

  • SHA1

    b995ba1b34b3debabad436b14ad5c94829e6e27b

  • SHA256

    f2b30831e93ef719ecc6b3d7fa88509a1b77d35068d4d6ab2728d9938c8a7859

  • SHA512

    656bca68ff35b4f341f2347af02b0f68cf56b1e3a20629dd446e0abad18d229de2501879a002c7bf99b9b27890fc2e5c1171bb7d585312bf0eaf74827d30200c

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

cbgo

Decoy

santesha.com

britneysbeautybar.com

sh-cy17.com

jeffcarveragency.com

3117111.com

sobrehosting.net

ddm123.xyz

toxcompliance.com

auditorydesigns.com

vliftfacial.com

ielhii.com

naameliss.com

ritualchariot.com

solchange.com

quatre-vingts.design

lawnmowermashine.com

braceletsstore.net

admappy.com

tollivercoltd.com

vaidix.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\fiyat talebi.exe
      "C:\Users\Admin\AppData\Local\Temp\fiyat talebi.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1776
      • C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe
        C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe C:\Users\Admin\AppData\Local\Temp\qhidoqldbb
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1704
        • C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe
          C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe C:\Users\Admin\AppData\Local\Temp\qhidoqldbb
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Windows\SysWOW64\msdt.exe
            "C:\Windows\SysWOW64\msdt.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:1932
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe"
              6⤵
                PID:1632

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\n4ctxmrbh0uoaq3yha
      Filesize

      212KB

      MD5

      0800086693d43f3e3f5248c8789ef97c

      SHA1

      9779f40e0a93bd5825d7f715453924819b9a59e6

      SHA256

      089179b2f01e25d4117e018c7ebe402d2e4c68b9774c15f29fde43fa57aa32df

      SHA512

      8fa85746c74bd7b2361dab36e3228a1c8f27f2d6b9d6a01b10ab97f07212bdc1ba52724d4239cc76b649763be8c2d2f0f298430fbbb1af94d7d4e1f50d52e0f4

    • C:\Users\Admin\AppData\Local\Temp\qhidoqldbb
      Filesize

      4KB

      MD5

      4189ad2dedcab199ef7a58a4c490733e

      SHA1

      023179460cc47e1ede06f9e4cc5b7ecfd87dadc2

      SHA256

      513b1e9affe4c24ff16e2156cb1bf14c0e7c75d53b6886341a01474e5c784f3b

      SHA512

      f27292ea85b5f4cf47c982dce736afdc69f9f0893b0a521546803e524e195a72b5a0e5c132a4f7fdcbed96baecfcee22f7e53363c71a309022dd312dee2597dc

    • C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe
      Filesize

      5KB

      MD5

      120556bf1317f6395f13ff5377e308d9

      SHA1

      f36799d4885de8cc8f8c947e4fc28e1a3a39beab

      SHA256

      63b0f72ed3dade8ad655daf220470057fce741dda011d4cfbdd7646460df3f46

      SHA512

      75902aac1f4f6758ac53ab717b6f91eb326a8acf331c495b08cff27c571c31d244d8b30cd812a2ecfd9fbf70c230f673672bdbde0b57ededfd8b1c26200c98dd

    • C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe
      Filesize

      5KB

      MD5

      120556bf1317f6395f13ff5377e308d9

      SHA1

      f36799d4885de8cc8f8c947e4fc28e1a3a39beab

      SHA256

      63b0f72ed3dade8ad655daf220470057fce741dda011d4cfbdd7646460df3f46

      SHA512

      75902aac1f4f6758ac53ab717b6f91eb326a8acf331c495b08cff27c571c31d244d8b30cd812a2ecfd9fbf70c230f673672bdbde0b57ededfd8b1c26200c98dd

    • C:\Users\Admin\AppData\Local\Temp\qmzngjtx.exe
      Filesize

      5KB

      MD5

      120556bf1317f6395f13ff5377e308d9

      SHA1

      f36799d4885de8cc8f8c947e4fc28e1a3a39beab

      SHA256

      63b0f72ed3dade8ad655daf220470057fce741dda011d4cfbdd7646460df3f46

      SHA512

      75902aac1f4f6758ac53ab717b6f91eb326a8acf331c495b08cff27c571c31d244d8b30cd812a2ecfd9fbf70c230f673672bdbde0b57ededfd8b1c26200c98dd

    • \Users\Admin\AppData\Local\Temp\qmzngjtx.exe
      Filesize

      5KB

      MD5

      120556bf1317f6395f13ff5377e308d9

      SHA1

      f36799d4885de8cc8f8c947e4fc28e1a3a39beab

      SHA256

      63b0f72ed3dade8ad655daf220470057fce741dda011d4cfbdd7646460df3f46

      SHA512

      75902aac1f4f6758ac53ab717b6f91eb326a8acf331c495b08cff27c571c31d244d8b30cd812a2ecfd9fbf70c230f673672bdbde0b57ededfd8b1c26200c98dd

    • \Users\Admin\AppData\Local\Temp\qmzngjtx.exe
      Filesize

      5KB

      MD5

      120556bf1317f6395f13ff5377e308d9

      SHA1

      f36799d4885de8cc8f8c947e4fc28e1a3a39beab

      SHA256

      63b0f72ed3dade8ad655daf220470057fce741dda011d4cfbdd7646460df3f46

      SHA512

      75902aac1f4f6758ac53ab717b6f91eb326a8acf331c495b08cff27c571c31d244d8b30cd812a2ecfd9fbf70c230f673672bdbde0b57ededfd8b1c26200c98dd

    • memory/1200-82-0x00000000075D0000-0x0000000007721000-memory.dmp
      Filesize

      1.3MB

    • memory/1200-74-0x0000000004AD0000-0x0000000004C56000-memory.dmp
      Filesize

      1.5MB

    • memory/1200-71-0x0000000004E70000-0x000000000500C000-memory.dmp
      Filesize

      1.6MB

    • memory/1440-68-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1440-65-0x000000000041D450-mapping.dmp
    • memory/1440-69-0x0000000000730000-0x0000000000A33000-memory.dmp
      Filesize

      3.0MB

    • memory/1440-70-0x0000000000340000-0x0000000000351000-memory.dmp
      Filesize

      68KB

    • memory/1440-64-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1440-73-0x00000000003A0000-0x00000000003B1000-memory.dmp
      Filesize

      68KB

    • memory/1632-77-0x0000000000000000-mapping.dmp
    • memory/1704-63-0x0000000000330000-0x0000000000332000-memory.dmp
      Filesize

      8KB

    • memory/1704-56-0x0000000000000000-mapping.dmp
    • memory/1776-54-0x0000000075691000-0x0000000075693000-memory.dmp
      Filesize

      8KB

    • memory/1932-75-0x0000000000000000-mapping.dmp
    • memory/1932-78-0x0000000000450000-0x0000000000544000-memory.dmp
      Filesize

      976KB

    • memory/1932-79-0x0000000000080000-0x00000000000A9000-memory.dmp
      Filesize

      164KB

    • memory/1932-80-0x0000000002230000-0x0000000002533000-memory.dmp
      Filesize

      3.0MB

    • memory/1932-81-0x0000000001F90000-0x0000000002020000-memory.dmp
      Filesize

      576KB