Analysis

  • max time kernel
    166s
  • max time network
    170s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    18-04-2022 14:32

General

  • Target

    aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe

  • Size

    271KB

  • MD5

    f9a20cce97d6efd9e8d071420a8858b7

  • SHA1

    17680094e9bdefe2f5205729f2b55be2ffca81fa

  • SHA256

    aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d

  • SHA512

    fb9055d9f19788e0c2d25f3f400165b630ef6f62604d6ee6a764c7a57f5f115737db4187be30641bca16af11d84d3afdde73b0790f5d43f682e10439ed7a1026

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

p00n

Decoy

beaniemart.com

sugarlaces.online

kinesio-leman.com

gasfreenft.com

ateneaespai.com

askyourhr.com

recruitloft.com

carolinasbestroofingcompany.com

coacher.online

freshmind.today

help-it.online

nicelink17.com

islandtimeoperations.com

agricurve.net

rizkhr.com

innovatorsincommerce.com

grownwings.com

learningout.store

miaglam.com

tengfeijd8.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3252
    • C:\Users\Admin\AppData\Local\Temp\aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe
      "C:\Users\Admin\AppData\Local\Temp\aa9db27b2063f5aee9f97d7d86b883686f51bd030d0b38d6daaed3629a230a7d.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3512
      • C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe
        C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5020
        • C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe
          C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe C:\Users\Admin\AppData\Local\Temp\pkjant
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4888
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4192
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe"
        3⤵
          PID:4048
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:4540
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:4556
          • C:\Program Files (x86)\J9r-lc\yp_wv1.exe
            "C:\Program Files (x86)\J9r-lc\yp_wv1.exe"
            2⤵
            • Executes dropped EXE
            PID:2396
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 668
              3⤵
              • Program crash
              PID:772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 2396 -ip 2396
          1⤵
            PID:4972

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files (x86)\J9r-lc\yp_wv1.exe

            Filesize

            70KB

            MD5

            f357de702f7b08ff1b60c2ca5bbdafa2

            SHA1

            bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a

            SHA256

            9b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5

            SHA512

            9b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8

          • C:\Program Files (x86)\J9r-lc\yp_wv1.exe

            Filesize

            70KB

            MD5

            f357de702f7b08ff1b60c2ca5bbdafa2

            SHA1

            bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a

            SHA256

            9b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5

            SHA512

            9b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8

          • C:\Users\Admin\AppData\Local\Temp\45s2zanww2v1sy0

            Filesize

            213KB

            MD5

            024f5eb96b56308cfb64fe436e8de447

            SHA1

            307585696be6985d5b7a3289dd4845f534868483

            SHA256

            926d2ab16139435d5fda9b2badafb9d5eefb606faf59cd1c7b44a282a22feefb

            SHA512

            e9754c234a15449ccc1e0d2f72c6a7cc63ef4887c2a5c8a93ab83905e42f3d85e77a1efe6b3e032e8b7d531a722c3b7da62349faf7921539947dd8e117bc650d

          • C:\Users\Admin\AppData\Local\Temp\DB1

            Filesize

            40KB

            MD5

            b608d407fc15adea97c26936bc6f03f6

            SHA1

            953e7420801c76393902c0d6bb56148947e41571

            SHA256

            b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

            SHA512

            cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

          • C:\Users\Admin\AppData\Local\Temp\pkjant

            Filesize

            4KB

            MD5

            35ba5cfdc4921d469e0f0959c2827785

            SHA1

            7295bd83ae1c581099495ec9d8fd9f9b62a97657

            SHA256

            c3a8511a37564f699ee8c9ec8340f73790bf81e55f3327f4d787b13dc333e013

            SHA512

            28be15b241179899df176541c469d49cd555e73871ee515bd2d931370fe416b8ad9b3464cfcb741156af126bcc1cdb9f5b5320671c16ffb1a25876d14952d4dd

          • C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe

            Filesize

            70KB

            MD5

            f357de702f7b08ff1b60c2ca5bbdafa2

            SHA1

            bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a

            SHA256

            9b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5

            SHA512

            9b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8

          • C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe

            Filesize

            70KB

            MD5

            f357de702f7b08ff1b60c2ca5bbdafa2

            SHA1

            bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a

            SHA256

            9b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5

            SHA512

            9b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8

          • C:\Users\Admin\AppData\Local\Temp\vvywdeos.exe

            Filesize

            70KB

            MD5

            f357de702f7b08ff1b60c2ca5bbdafa2

            SHA1

            bc9e18bfbb4a9ce14351dfdffc3f57d22b40831a

            SHA256

            9b4b5b5048151f723ca57f67e9107e24c844f1be62b977efaeabedb5d620eaf5

            SHA512

            9b096e239c01f7bf7c946719deb3cadaf206ebd29530cf425a885e7351286b5f010b3fb66a3d55cef5200f2504ef76648789ec95a4935a6ea59a8f51280484d8

          • memory/3252-141-0x0000000008800000-0x0000000008951000-memory.dmp

            Filesize

            1.3MB

          • memory/3252-151-0x0000000007690000-0x0000000007746000-memory.dmp

            Filesize

            728KB

          • memory/3252-144-0x0000000002F70000-0x0000000003027000-memory.dmp

            Filesize

            732KB

          • memory/4192-150-0x0000000001410000-0x00000000014A0000-memory.dmp

            Filesize

            576KB

          • memory/4192-147-0x0000000000970000-0x0000000000999000-memory.dmp

            Filesize

            164KB

          • memory/4192-146-0x0000000000ED0000-0x0000000000EEE000-memory.dmp

            Filesize

            120KB

          • memory/4192-149-0x00000000016F0000-0x0000000001A3A000-memory.dmp

            Filesize

            3.3MB

          • memory/4888-136-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4888-143-0x00000000016C0000-0x00000000016D1000-memory.dmp

            Filesize

            68KB

          • memory/4888-142-0x0000000000400000-0x0000000000429000-memory.dmp

            Filesize

            164KB

          • memory/4888-140-0x00000000011A0000-0x00000000011B1000-memory.dmp

            Filesize

            68KB

          • memory/4888-138-0x00000000011F0000-0x000000000153A000-memory.dmp

            Filesize

            3.3MB