Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 00:51

General

  • Target

    PO0932083943974.exe

  • Size

    628KB

  • MD5

    42e8fda0885f8ce54deaabab4d25f775

  • SHA1

    f1173fbe2ddf0b031f4ee189e7448e0d13084595

  • SHA256

    a0086dfee2dba4d6a0adab05e848cfbb9755f68be7adef3ff35ff9740e5a1c2e

  • SHA512

    015521a434a05f8fcff947f1dc7bcebf1f1ad9d70dc44612ebed84dfd6de3af96ddf0439a994d0bd16e9e07dc888af20389b606824e700c2557ce95f0c802516

Malware Config

Extracted

Family

xloader

Version

2.0

Campaign

b6fg

Decoy

multlockmt5.com

mohajrannoor.com

robynhoodofretail.info

belinv.com

hotellasab.com

kibrismosad.com

xn--fxwm39aeb590h.xn--io0a7i

resetbrasil.com

tcsonhvac.com

theresav.net

bohoqi.info

machinafuturae.com

mambavault.com

xn--980am9a.top

yumiang.com

evntmonitor.com

83003kk.com

triterm.com

8800pe.com

silvanstudio.com

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Xloader Payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Uses the VBS compiler for execution 1 TTPs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\PO0932083943974.exe
      "C:\Users\Admin\AppData\Local\Temp\PO0932083943974.exe"
      2⤵
      • Checks BIOS information in registry
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:560
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1764
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:520
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"
        3⤵
          PID:1820
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:2024

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scripting

      1
      T1064

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Virtualization/Sandbox Evasion

      2
      T1497

      Modify Registry

      2
      T1112

      Scripting

      1
      T1064

      Discovery

      Query Registry

      4
      T1012

      Virtualization/Sandbox Evasion

      2
      T1497

      System Information Discovery

      2
      T1082

      Peripheral Device Discovery

      1
      T1120

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/520-74-0x0000000002360000-0x00000000023EF000-memory.dmp
        Filesize

        572KB

      • memory/520-73-0x0000000002050000-0x0000000002353000-memory.dmp
        Filesize

        3.0MB

      • memory/520-72-0x0000000000080000-0x00000000000A7000-memory.dmp
        Filesize

        156KB

      • memory/520-71-0x0000000000170000-0x000000000018F000-memory.dmp
        Filesize

        124KB

      • memory/520-68-0x0000000000000000-mapping.dmp
      • memory/560-55-0x00000000757C1000-0x00000000757C3000-memory.dmp
        Filesize

        8KB

      • memory/560-56-0x00000000002E0000-0x00000000002EA000-memory.dmp
        Filesize

        40KB

      • memory/560-57-0x0000000000650000-0x0000000000686000-memory.dmp
        Filesize

        216KB

      • memory/560-54-0x0000000000BE0000-0x0000000000C84000-memory.dmp
        Filesize

        656KB

      • memory/1200-67-0x0000000006690000-0x00000000067FC000-memory.dmp
        Filesize

        1.4MB

      • memory/1200-75-0x0000000007050000-0x0000000007167000-memory.dmp
        Filesize

        1.1MB

      • memory/1764-59-0x0000000000400000-0x0000000000427000-memory.dmp
        Filesize

        156KB

      • memory/1764-66-0x0000000000160000-0x0000000000170000-memory.dmp
        Filesize

        64KB

      • memory/1764-65-0x0000000000D30000-0x0000000001033000-memory.dmp
        Filesize

        3.0MB

      • memory/1764-64-0x0000000000400000-0x0000000000427000-memory.dmp
        Filesize

        156KB

      • memory/1764-62-0x000000000041C160-mapping.dmp
      • memory/1764-61-0x0000000000400000-0x0000000000427000-memory.dmp
        Filesize

        156KB

      • memory/1764-58-0x0000000000400000-0x0000000000427000-memory.dmp
        Filesize

        156KB

      • memory/1820-70-0x0000000000000000-mapping.dmp