Analysis

  • max time kernel
    275s
  • max time network
    321s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    02-06-2022 13:04

General

  • Target

    3e497c13b9cc59ad2610a98d6ea189dd0600db5c9f799ed7eefbeba4fb4f2cf0.exe

  • Size

    1.2MB

  • MD5

    bd13211d0cc71fb85df707023739a779

  • SHA1

    af9a0b01f412c41a6412b0f73f80569b6049bd01

  • SHA256

    3e497c13b9cc59ad2610a98d6ea189dd0600db5c9f799ed7eefbeba4fb4f2cf0

  • SHA512

    44ad3c21462b7578b410bdd85dd05d0b5feafbbc94b76a5c6dbe04c0a2d174673f64cecb5df1d693274aff281f780d61206aa6bdd007e07f6a467367620da3da

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • ModiLoader Second Stage 31 IoCs
  • Xloader Payload 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\3e497c13b9cc59ad2610a98d6ea189dd0600db5c9f799ed7eefbeba4fb4f2cf0.exe
      "C:\Users\Admin\AppData\Local\Temp\3e497c13b9cc59ad2610a98d6ea189dd0600db5c9f799ed7eefbeba4fb4f2cf0.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1068
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1112
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\DpiScaling.exe"
        3⤵
          PID:976
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:664
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:1656

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Command-Line Interface

        1
        T1059

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Install Root Certificate

        1
        T1130

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/976-110-0x0000000000000000-mapping.dmp
        • memory/1068-95-0x0000000000000000-mapping.dmp
        • memory/1068-93-0x0000000010410000-0x000000001043B000-memory.dmp
          Filesize

          172KB

        • memory/1068-99-0x0000000001F70000-0x0000000002273000-memory.dmp
          Filesize

          3.0MB

        • memory/1068-103-0x0000000000250000-0x0000000000261000-memory.dmp
          Filesize

          68KB

        • memory/1068-109-0x0000000010410000-0x000000001043B000-memory.dmp
          Filesize

          172KB

        • memory/1112-112-0x00000000000E0000-0x000000000010B000-memory.dmp
          Filesize

          172KB

        • memory/1112-113-0x0000000001EE0000-0x00000000021E3000-memory.dmp
          Filesize

          3.0MB

        • memory/1112-111-0x00000000003F0000-0x00000000003FA000-memory.dmp
          Filesize

          40KB

        • memory/1112-114-0x0000000001DE0000-0x0000000001E70000-memory.dmp
          Filesize

          576KB

        • memory/1112-104-0x0000000000000000-mapping.dmp
        • memory/1112-116-0x00000000000E0000-0x000000000010B000-memory.dmp
          Filesize

          172KB

        • memory/1232-106-0x0000000004040000-0x0000000004115000-memory.dmp
          Filesize

          852KB

        • memory/1232-115-0x00000000042D0000-0x000000000437E000-memory.dmp
          Filesize

          696KB

        • memory/1232-117-0x00000000042D0000-0x000000000437E000-memory.dmp
          Filesize

          696KB

        • memory/1868-90-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-89-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-85-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-84-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-83-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-82-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-81-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-80-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-79-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-78-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-77-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-87-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-88-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-92-0x0000000010410000-0x000000001043B000-memory.dmp
          Filesize

          172KB

        • memory/1868-69-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-96-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-98-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-86-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-100-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-102-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-54-0x0000000076011000-0x0000000076013000-memory.dmp
          Filesize

          8KB

        • memory/1868-70-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-105-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-73-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-74-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-75-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-76-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-71-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-72-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-68-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-67-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-66-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB

        • memory/1868-65-0x00000000043A0000-0x00000000043F2000-memory.dmp
          Filesize

          328KB