Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 09:59

General

  • Target

    PO#101581.exe

  • Size

    869KB

  • MD5

    95f35b3fb58633c97069fe1bc12f39f5

  • SHA1

    e1ee2cf79953cc0f472c9b3af9fcc389a5bc492d

  • SHA256

    151572bec6e274bad481a8c0736a4888931c086f3fdf890be9811eae7c0c0c36

  • SHA512

    358656d5e219d138a56e25f54b890a98062b5539db4da25685e659276ecfafa68c00ffa83383dac8d35cfe6270eec87da8b306a61a125128869e61ffb934d050

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

ssmm

Decoy

bhealthybu.com

formasyonlar.com

huddleadvising.com

iroofer.net

pokerisparadise.com

partnrsocial.com

omnixinity.com

sandibet.biz

xxxpool.xyz

mainsuranceagency.com

filipkaarrtofffers.online

txgongsi.com

bonasuplementos.com

sxp89app.space

grandeurjewelryph.com

productsorcerer.com

mrussellhandyman.com

igorstelea.com

cateraevents.com

yashaswistudio.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\PO#101581.exe
      "C:\Users\Admin\AppData\Local\Temp\PO#101581.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Users\Admin\AppData\Local\Temp\PO#101581.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1280
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PO#101581.exe"
        3⤵
        • Deletes itself
        PID:524
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:864

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/524-72-0x0000000000000000-mapping.dmp
    • memory/1056-54-0x0000000000A50000-0x0000000000B30000-memory.dmp
      Filesize

      896KB

    • memory/1056-55-0x00000000764C1000-0x00000000764C3000-memory.dmp
      Filesize

      8KB

    • memory/1056-56-0x00000000003E0000-0x00000000003EA000-memory.dmp
      Filesize

      40KB

    • memory/1056-57-0x00000000052A0000-0x0000000005320000-memory.dmp
      Filesize

      512KB

    • memory/1056-58-0x00000000004E0000-0x0000000000512000-memory.dmp
      Filesize

      200KB

    • memory/1220-75-0x0000000004C20000-0x0000000004D24000-memory.dmp
      Filesize

      1.0MB

    • memory/1220-68-0x0000000004020000-0x00000000040E3000-memory.dmp
      Filesize

      780KB

    • memory/1280-66-0x0000000000B30000-0x0000000000E33000-memory.dmp
      Filesize

      3.0MB

    • memory/1280-65-0x0000000000400000-0x000000000042B000-memory.dmp
      Filesize

      172KB

    • memory/1280-63-0x000000000041F290-mapping.dmp
    • memory/1280-67-0x0000000000200000-0x0000000000211000-memory.dmp
      Filesize

      68KB

    • memory/1280-62-0x0000000000400000-0x000000000042B000-memory.dmp
      Filesize

      172KB

    • memory/1280-60-0x0000000000400000-0x000000000042B000-memory.dmp
      Filesize

      172KB

    • memory/1280-59-0x0000000000400000-0x000000000042B000-memory.dmp
      Filesize

      172KB

    • memory/1980-69-0x0000000000000000-mapping.dmp
    • memory/1980-70-0x00000000006E0000-0x00000000006E6000-memory.dmp
      Filesize

      24KB

    • memory/1980-71-0x0000000000080000-0x00000000000AB000-memory.dmp
      Filesize

      172KB

    • memory/1980-73-0x0000000000880000-0x0000000000B83000-memory.dmp
      Filesize

      3.0MB

    • memory/1980-74-0x00000000006F0000-0x0000000000780000-memory.dmp
      Filesize

      576KB