Analysis Overview
SHA256
a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300
Threat Level: Known bad
The file a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300 was found to be: Known bad.
Malicious Activity Summary
Formbook
Xloader
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (GET)
Xloader Payload
Adds policy Run key to start application
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
Drops file in Program Files directory
Suspicious use of WriteProcessMemory
Modifies registry class
Modifies Internet Explorer settings
Suspicious use of FindShellTrayWindow
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
Suspicious use of AdjustPrivilegeToken
Suspicious behavior: MapViewOfSection
MITRE ATT&CK
Enterprise Matrix V6
Analysis: static1
Detonation Overview
Reported
2022-06-21 10:52
Signatures
Analysis: behavioral1
Detonation Overview
Submitted
2022-06-21 10:52
Reported
2022-06-21 10:55
Platform
win10v2004-20220414-en
Max time kernel
150s
Max time network
153s
Command Line
Signatures
Formbook
Xloader
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
Xloader Payload
| Description | Indicator | Process | Target |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
| N/A | N/A | N/A | N/A |
Adds policy Run key to start application
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run | C:\Windows\SysWOW64\wlanext.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\J6QL8PXHQZC = "C:\\Program Files (x86)\\Avt5dufwh\\config4hip.exe" | C:\Windows\SysWOW64\wlanext.exe | N/A |
Reads user/profile data of web browsers
Suspicious use of SetThreadContext
| Description | Indicator | Process | Target |
| PID 2388 set thread context of 4756 | N/A | C:\Users\Admin\AppData\Local\Temp\a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe |
| PID 4756 set thread context of 3144 | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | C:\Windows\Explorer.EXE |
| PID 2432 set thread context of 3144 | N/A | C:\Windows\SysWOW64\wlanext.exe | C:\Windows\Explorer.EXE |
Drops file in Program Files directory
| Description | Indicator | Process | Target |
| File opened for modification | C:\Program Files (x86)\Avt5dufwh\config4hip.exe | C:\Windows\SysWOW64\wlanext.exe | N/A |
Modifies Internet Explorer settings
| Description | Indicator | Process | Target |
| Key created | \Registry\User\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 | C:\Windows\SysWOW64\wlanext.exe | N/A |
Modifies registry class
| Description | Indicator | Process | Target |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{1f3427c8-5c10-4210-aa03-2ee45287d668}\Instance\ | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{4336a54d-038b-4685-ab02-99bb52d3fb8b}\Instance\ | C:\Windows\Explorer.EXE | N/A |
| Key created | \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000_Classes\CLSID\{018D5C66-4533-4307-9B53-224DE2ED1FE6}\Instance\ | C:\Windows\Explorer.EXE | N/A |
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: GetForegroundWindowSpam
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious behavior: MapViewOfSection
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| N/A | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\wlanext.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\wlanext.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\wlanext.exe | N/A |
| N/A | N/A | C:\Windows\SysWOW64\wlanext.exe | N/A |
Suspicious use of AdjustPrivilegeToken
| Description | Indicator | Process | Target |
| Token: SeDebugPrivilege | N/A | C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe | N/A |
| Token: SeDebugPrivilege | N/A | C:\Windows\SysWOW64\wlanext.exe | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeShutdownPrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
| Token: SeCreatePagefilePrivilege | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of FindShellTrayWindow
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
| N/A | N/A | C:\Windows\Explorer.EXE | N/A |
Suspicious use of WriteProcessMemory
Processes
C:\Windows\Explorer.EXE
C:\Windows\Explorer.EXE
C:\Users\Admin\AppData\Local\Temp\a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300.exe
"C:\Users\Admin\AppData\Local\Temp\a7492a3e2caa18c09290209462772d7356966ed9fe91f86830284d950604b300.exe"
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
C:\Windows\SysWOW64\wlanext.exe
"C:\Windows\SysWOW64\wlanext.exe"
C:\Windows\SysWOW64\cmd.exe
/c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"
C:\Windows\SysWOW64\cmd.exe
/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
C:\Windows\SysWOW64\cmd.exe
/c copy "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
C:\Program Files\Mozilla Firefox\Firefox.exe
"C:\Program Files\Mozilla Firefox\Firefox.exe"
Network
| Country | Destination | Domain | Proto |
| US | 209.197.3.8:80 | tcp | |
| NL | 195.133.18.117:5746 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| US | 52.109.12.19:443 | tcp | |
| NL | 104.97.14.81:80 | tcp | |
| US | 209.197.3.8:80 | tcp | |
| IE | 20.54.110.249:443 | tcp | |
| US | 8.8.8.8:53 | www.fxivcama.com | udp |
| US | 69.57.161.210:80 | www.fxivcama.com | tcp |
| NL | 104.97.14.80:80 | tcp | |
| NL | 104.97.14.80:80 | tcp | |
| US | 8.8.8.8:53 | www.zhouwuxiawu.com | udp |
| US | 20.42.65.89:443 | tcp | |
| US | 13.107.21.200:443 | tcp | |
| US | 8.8.8.8:53 | www.7788tiepin.com | udp |
| SG | 149.127.225.41:80 | www.7788tiepin.com | tcp |
| SG | 149.127.225.41:80 | www.7788tiepin.com | tcp |
| SG | 149.127.225.41:80 | www.7788tiepin.com | tcp |
| US | 8.8.8.8:53 | www.jivraj9india.com | udp |
| US | 15.197.142.173:80 | www.jivraj9india.com | tcp |
| US | 15.197.142.173:80 | www.jivraj9india.com | tcp |
| US | 15.197.142.173:80 | www.jivraj9india.com | tcp |
| US | 8.8.8.8:53 | www.nxteam.net | udp |
| US | 13.107.21.200:443 | tcp | |
| US | 8.8.8.8:53 | www.luminantentertainment.com | udp |
| US | 192.185.24.234:80 | www.luminantentertainment.com | tcp |
| US | 192.185.24.234:80 | www.luminantentertainment.com | tcp |
| US | 192.185.24.234:80 | www.luminantentertainment.com | tcp |
| US | 8.8.8.8:53 | www.symmetrya.online | udp |
| ES | 31.214.178.54:80 | www.symmetrya.online | tcp |
| ES | 31.214.178.54:80 | www.symmetrya.online | tcp |
| ES | 31.214.178.54:80 | www.symmetrya.online | tcp |
| US | 8.8.8.8:53 | www.zs-yaoshi.com | udp |
| US | 166.88.174.43:80 | www.zs-yaoshi.com | tcp |
| US | 8.8.8.8:53 | www.zs-yaoshi.com | udp |
| US | 166.88.174.43:80 | www.zs-yaoshi.com | tcp |
| US | 166.88.174.43:80 | www.zs-yaoshi.com | tcp |
Files
memory/2388-130-0x0000000000280000-0x00000000002CC000-memory.dmp
memory/4756-131-0x0000000000000000-mapping.dmp
memory/4756-132-0x0000000000400000-0x000000000042B000-memory.dmp
memory/4756-134-0x0000000001290000-0x00000000015DA000-memory.dmp
memory/4756-135-0x0000000001220000-0x0000000001231000-memory.dmp
memory/3144-136-0x0000000007F70000-0x0000000008113000-memory.dmp
memory/2432-137-0x0000000000000000-mapping.dmp
memory/4756-138-0x0000000000400000-0x000000000042B000-memory.dmp
memory/788-139-0x0000000000000000-mapping.dmp
memory/2432-140-0x00000000016D0000-0x0000000001A1A000-memory.dmp
memory/2432-141-0x0000000000D80000-0x0000000000D97000-memory.dmp
memory/2432-142-0x0000000001010000-0x000000000103B000-memory.dmp
memory/2432-143-0x0000000001560000-0x00000000015F0000-memory.dmp
memory/3144-144-0x0000000002760000-0x000000000286E000-memory.dmp
memory/2432-145-0x0000000001010000-0x000000000103B000-memory.dmp
memory/3144-146-0x0000000002760000-0x000000000286E000-memory.dmp
memory/2376-147-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\DB1
| MD5 | b608d407fc15adea97c26936bc6f03f6 |
| SHA1 | 953e7420801c76393902c0d6bb56148947e41571 |
| SHA256 | b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf |
| SHA512 | cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4 |
memory/3700-149-0x0000000000000000-mapping.dmp
C:\Users\Admin\AppData\Local\Temp\DB1
| MD5 | 349e6eb110e34a08924d92f6b334801d |
| SHA1 | bdfb289daff51890cc71697b6322aa4b35ec9169 |
| SHA256 | c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a |
| SHA512 | 2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574 |