Analysis

  • max time kernel
    188s
  • max time network
    186s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    09-06-2022 11:23

General

  • Target

    soa.exe

  • Size

    733KB

  • MD5

    430cb910503e0fb17dea4259ad82e0c9

  • SHA1

    2a6d2f9521ff771c5320719f7142ddec7163e2b7

  • SHA256

    29e01694dfdb882f3922844f2fa640eb19fb99ff1179ac378df15b45fac32f11

  • SHA512

    1cb05ab896d6f2ca211d25242fdf515ce7399e53bd09e697f621a6bc911a0ac098e9bfe3d5cbb623629e3ca10d5474d429bc8c07ab2a07d02f6c1fa9ea2dd288

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

a8hq

Decoy

veteransductcleaning.com

beajtjunkies.com

houseofascofi.com

scottsdalemediator.com

atelyadesign.com

profitcase.pro

imtokenio.club

qinglingpai.com

bigsmile-meal.net

daytonlivestream.com

aspiradores10.online

ytybs120.com

hdatelier.com

bearpierce.com

yeson28ca.com

booklearner.com

m8j9.club

mmophamthinhlegend.space

hq4a7o6zb.com

sophiadaki.online

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Users\Admin\AppData\Local\Temp\soa.exe
      "C:\Users\Admin\AppData\Local\Temp\soa.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Users\Admin\AppData\Local\Temp\soa.exe
        "{path}"
        3⤵
          PID:2004
        • C:\Users\Admin\AppData\Local\Temp\soa.exe
          "{path}"
          3⤵
            PID:2872
          • C:\Users\Admin\AppData\Local\Temp\soa.exe
            "{path}"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:4468
        • C:\Windows\SysWOW64\systray.exe
          "C:\Windows\SysWOW64\systray.exe"
          2⤵
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Drops file in Program Files directory
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1420
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\soa.exe"
            3⤵
              PID:2288
            • C:\Windows\SysWOW64\cmd.exe
              /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
              3⤵
                PID:4464

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          2
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/968-131-0x00000000052F0000-0x0000000005894000-memory.dmp
            Filesize

            5.6MB

          • memory/968-132-0x0000000004DF0000-0x0000000004E82000-memory.dmp
            Filesize

            584KB

          • memory/968-133-0x0000000004F70000-0x000000000500C000-memory.dmp
            Filesize

            624KB

          • memory/968-134-0x0000000004E90000-0x0000000004E9A000-memory.dmp
            Filesize

            40KB

          • memory/968-130-0x00000000004D0000-0x000000000058C000-memory.dmp
            Filesize

            752KB

          • memory/1420-143-0x0000000000000000-mapping.dmp
          • memory/1420-151-0x0000000000C60000-0x0000000000C8B000-memory.dmp
            Filesize

            172KB

          • memory/1420-149-0x0000000003030000-0x00000000030C0000-memory.dmp
            Filesize

            576KB

          • memory/1420-148-0x0000000000C60000-0x0000000000C8B000-memory.dmp
            Filesize

            172KB

          • memory/1420-147-0x0000000002CE0000-0x000000000302A000-memory.dmp
            Filesize

            3.3MB

          • memory/1420-146-0x0000000000DD0000-0x0000000000DD6000-memory.dmp
            Filesize

            24KB

          • memory/2004-135-0x0000000000000000-mapping.dmp
          • memory/2288-145-0x0000000000000000-mapping.dmp
          • memory/2872-136-0x0000000000000000-mapping.dmp
          • memory/3140-142-0x0000000002F30000-0x000000000304C000-memory.dmp
            Filesize

            1.1MB

          • memory/3140-150-0x0000000002A30000-0x0000000002B04000-memory.dmp
            Filesize

            848KB

          • memory/3140-152-0x0000000002A30000-0x0000000002B04000-memory.dmp
            Filesize

            848KB

          • memory/4464-153-0x0000000000000000-mapping.dmp
          • memory/4468-144-0x0000000000400000-0x000000000042B000-memory.dmp
            Filesize

            172KB

          • memory/4468-141-0x00000000014F0000-0x0000000001501000-memory.dmp
            Filesize

            68KB

          • memory/4468-140-0x0000000001580000-0x00000000018CA000-memory.dmp
            Filesize

            3.3MB

          • memory/4468-138-0x0000000000400000-0x000000000042B000-memory.dmp
            Filesize

            172KB

          • memory/4468-137-0x0000000000000000-mapping.dmp