Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-06-2022 20:56

General

  • Target

    Yeni siparis eklendi.exe

  • Size

    856KB

  • MD5

    ef18be7a8a68e50aca6d38f09f27e85a

  • SHA1

    3fafd20f322f0b979d7f063b4fcc050e6c31f9dc

  • SHA256

    6e995aee360d55b347727e8ffc0c61df76cbf467f4380840d63ec80181e2d5bf

  • SHA512

    cf53775a14e4cd407f70ed978985163e0c60c6394a954b918b989036d51d4a9bcae9028831925f62831503d1b8d5f1b35e4d5b5815564dc201c159be3531486e

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • ModiLoader Second Stage 38 IoCs
  • Xloader Payload 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\Yeni siparis eklendi.exe
      "C:\Users\Admin\AppData\Local\Temp\Yeni siparis eklendi.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Windows\SysWOW64\logagent.exe
        C:\Windows\System32\logagent.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1628
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1504
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\logagent.exe"
        3⤵
          PID:1632
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:592

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      4
      T1112

      Install Root Certificate

      1
      T1130

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1008-73-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-109-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-66-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-68-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-67-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-71-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-72-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-70-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-69-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-76-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-75-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-90-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-89-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-88-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-87-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-86-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-85-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-84-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-83-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-82-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-81-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-80-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp
        Filesize

        8KB

      • memory/1008-78-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-77-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-74-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-79-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-92-0x0000000010410000-0x000000001043B000-memory.dmp
        Filesize

        172KB

      • memory/1008-65-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-100-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-99-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-97-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-96-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-114-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-113-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-112-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-111-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-98-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-108-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1008-107-0x0000000004940000-0x0000000004992000-memory.dmp
        Filesize

        328KB

      • memory/1280-128-0x0000000006AE0000-0x0000000006C6E000-memory.dmp
        Filesize

        1.6MB

      • memory/1280-119-0x0000000004920000-0x00000000049E8000-memory.dmp
        Filesize

        800KB

      • memory/1280-126-0x0000000006AE0000-0x0000000006C6E000-memory.dmp
        Filesize

        1.6MB

      • memory/1504-125-0x0000000000940000-0x00000000009D0000-memory.dmp
        Filesize

        576KB

      • memory/1504-120-0x0000000000000000-mapping.dmp
      • memory/1504-122-0x0000000002190000-0x0000000002493000-memory.dmp
        Filesize

        3.0MB

      • memory/1504-127-0x0000000000080000-0x00000000000AB000-memory.dmp
        Filesize

        172KB

      • memory/1504-123-0x0000000000D70000-0x0000000000D86000-memory.dmp
        Filesize

        88KB

      • memory/1504-124-0x0000000000080000-0x00000000000AB000-memory.dmp
        Filesize

        172KB

      • memory/1628-118-0x0000000000200000-0x0000000000211000-memory.dmp
        Filesize

        68KB

      • memory/1628-95-0x0000000000000000-mapping.dmp
      • memory/1628-93-0x0000000010410000-0x000000001043B000-memory.dmp
        Filesize

        172KB

      • memory/1628-116-0x0000000010410000-0x000000001043B000-memory.dmp
        Filesize

        172KB

      • memory/1628-117-0x0000000002130000-0x0000000002433000-memory.dmp
        Filesize

        3.0MB

      • memory/1632-121-0x0000000000000000-mapping.dmp