Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
23-06-2022 05:56
Static task
static1
Behavioral task
behavioral1
Sample
PO_20230025-03662.js
Resource
win7-20220414-en
General
-
Target
PO_20230025-03662.js
-
Size
633KB
-
MD5
9659595bb96500ea6ac6892bcb450d03
-
SHA1
db8e3c13226387bbdd7703abd60baf6e78851789
-
SHA256
dee7026593429404b9cc00a28b12202ecf60049be57f5bf9a0b7dae383055e06
-
SHA512
e6da4a8e7d5e99813d581bb18eee55c9aa629a974412887b1f412f6b860283be68f3d47b16d11ee738c2b8e7500b33c42e24f6d20cfb4175598e0c9c99e3a48c
Malware Config
Extracted
xloader
2.9
vs8g
xEVEsySadSMf8UUC
H8ZbYtGKWPCfp91+uS3TFo/F7tYacwDqHw==
L/St5UjIhTMzEHsb
8h8tDvq0nl8JCWoagxa0MVyvnA==
7bml44z9jZsZx8Co2T8=
EwH88ZtcOu8ehs2P2o6wv78FEe4+xRQ=
bTn3LpE1HfpPAXI=
nYxT+9GLhS1d3zzGJuTDlgpT
HxonIwh8TesenMCo2T8=
Ki83MiehhC9e1i7YQ/Wd32JsGcun
wHcUByFRMuEGh8Co2T8=
86tqpg/Jy60eFmMRPefDlgpT
grSUYa5yahUf8UUC
HVviVsk7Cb6Elc571pnSWCJ93G17PkiI
6LJ1qBPUtGNIl8Co2T8=
AYuWD33xt44VxsCo2T8=
/smXvLMh868VzQqs99/DlgpT
1kEMNVtaMw6KmN+YANYm+kA=
daarti3nbFVKnsCo2T8=
0EJM6cFFHvawA2U=
WZmLjeanlDoDRmMJeRfM
CAnpqoPMmEdBmsCo2T8=
S7NRSknz2IDxrfexzMWcXg==
hbhFvI9GHbYe6lDkMNYm+kA=
ZDYJSK5aKMqTmgGwC9pyCcxc
WBqkiYw6Cq0R1EEHeRbNVMfUWPW+
nDdqqAaRcAQ=
lsLX1cM9FrbMFXIZc/m0MVyvnA==
YceJrx3/7aDcctOaFZQygvVPcl0=
S7Byvh2dXnV5TF0kfw==
zaBZEvt6+etgHQ==
zwcVn349GMs38kfqNPO/MVyvnA==
wi/0NwnAbRwf8UUC
8vYWUbleFPawA2U=
lllK3cr5kDsC
QwHKGfaybiUf8UUC
gGk69u/TalUKIoyTx6PE
6lstUki4iTx4TF0kfw==
1hwVGQl6+etgHQ==
55QxLhZ++etgHQ==
XpUZkHZSGPpPAXI=
b/rRDHMmDMn8lQu9I93DlgpT
grW5q74PiWDh3b3TzoJzZd9Z
HctUSLGkTy0gaK06mjc=
742P/3XnqmZMnMCo2T8=
SwOlZ8q6chM=
XMtX4gaRcAQ=
gqO80CPQo05EmsCo2T8=
jDfY4dVROPVVTF0kfw==
HBcQ9d1lQvL/PYEEPefDlgpT
1FkgSrtsNNTKIJuTx6PE
KKNX0Knpqz0V
JNPadlPYyGVkscCo2T8=
+a2vJgnRyHi2SZJOyJlQn07X7s0acwDqHw==
IE9RTrmihShQ4jrezMWcXg==
+FPcOAZW3vawA2U=
XSH8PZEHwmk2Tp+Tx6PE
0odKiwftyW2aAUnfM9WPZ/RK
Ih8VBfKimjFn/24iVgcM8/VPcl0=
JYeAApzpqz0V
mQGklYL+yXHRpCHTLtYm+kA=
aduCh9uUg2zu60oK
1QcE/VwM0bhnrwCbzzw=
6NujcFnPuV5MnMCo2T8=
madeinfrance.plus
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
Xloader Payload 4 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bin.exe xloader behavioral1/memory/1492-66-0x0000000000080000-0x00000000000AC000-memory.dmp xloader C:\Users\Admin\AppData\Local\Temp\bin.exe xloader behavioral1/memory/1492-72-0x0000000000080000-0x00000000000AC000-memory.dmp xloader -
Blocklisted process makes network request 16 IoCs
Processes:
wscript.exeflow pid process 4 2044 wscript.exe 5 2044 wscript.exe 7 2044 wscript.exe 11 2044 wscript.exe 15 2044 wscript.exe 16 2044 wscript.exe 23 2044 wscript.exe 30 2044 wscript.exe 32 2044 wscript.exe 39 2044 wscript.exe 45 2044 wscript.exe 53 2044 wscript.exe 57 2044 wscript.exe 60 2044 wscript.exe 62 2044 wscript.exe 67 2044 wscript.exe -
Executes dropped EXE 1 IoCs
Processes:
bin.exepid process 952 bin.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
bin.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Control Panel\International\Geo\Nation bin.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KmBIsnwxko.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KmBIsnwxko.js wscript.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
control.exewscript.exedescription ioc process Key created \Registry\Machine\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run control.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\LNU4L = "C:\\Program Files (x86)\\Saz7tdx\\configyjlhb6b.exe" control.exe Key created \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-1819626980-2277161760-1023733287-1000\Software\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\KmBIsnwxko.js\"" wscript.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bin.execontrol.exedescription pid process target process PID 952 set thread context of 1372 952 bin.exe Explorer.EXE PID 1492 set thread context of 1372 1492 control.exe Explorer.EXE -
Drops file in Program Files directory 1 IoCs
Processes:
control.exedescription ioc process File opened for modification C:\Program Files (x86)\Saz7tdx\configyjlhb6b.exe control.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Processes:
control.exedescription ioc process Key created \Registry\User\S-1-5-21-1819626980-2277161760-1023733287-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 control.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
bin.execontrol.exepid process 952 bin.exe 952 bin.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
bin.execontrol.exepid process 952 bin.exe 952 bin.exe 952 bin.exe 1492 control.exe 1492 control.exe 1492 control.exe 1492 control.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
bin.execontrol.exedescription pid process Token: SeDebugPrivilege 952 bin.exe Token: SeDebugPrivilege 1492 control.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
Processes:
Explorer.EXEpid process 1372 Explorer.EXE 1372 Explorer.EXE -
Suspicious use of SendNotifyMessage 2 IoCs
Processes:
Explorer.EXEpid process 1372 Explorer.EXE 1372 Explorer.EXE -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
wscript.exeExplorer.EXEcontrol.exedescription pid process target process PID 1928 wrote to memory of 2044 1928 wscript.exe wscript.exe PID 1928 wrote to memory of 2044 1928 wscript.exe wscript.exe PID 1928 wrote to memory of 2044 1928 wscript.exe wscript.exe PID 1928 wrote to memory of 952 1928 wscript.exe bin.exe PID 1928 wrote to memory of 952 1928 wscript.exe bin.exe PID 1928 wrote to memory of 952 1928 wscript.exe bin.exe PID 1928 wrote to memory of 952 1928 wscript.exe bin.exe PID 1372 wrote to memory of 1492 1372 Explorer.EXE control.exe PID 1372 wrote to memory of 1492 1372 Explorer.EXE control.exe PID 1372 wrote to memory of 1492 1372 Explorer.EXE control.exe PID 1372 wrote to memory of 1492 1372 Explorer.EXE control.exe PID 1492 wrote to memory of 1512 1492 control.exe cmd.exe PID 1492 wrote to memory of 1512 1492 control.exe cmd.exe PID 1492 wrote to memory of 1512 1492 control.exe cmd.exe PID 1492 wrote to memory of 1512 1492 control.exe cmd.exe PID 1492 wrote to memory of 308 1492 control.exe Firefox.exe PID 1492 wrote to memory of 308 1492 control.exe Firefox.exe PID 1492 wrote to memory of 308 1492 control.exe Firefox.exe PID 1492 wrote to memory of 308 1492 control.exe Firefox.exe PID 1492 wrote to memory of 308 1492 control.exe Firefox.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO_20230025-03662.js2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KmBIsnwxko.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\control.exe"C:\Windows\SysWOW64\control.exe"2⤵
- Adds Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\bin.exeFilesize
174KB
MD53ae87cd93196b3f86a2e1cfa3e6c9133
SHA164b444869181c8893d695072239bc48681ea10cd
SHA2560a1b761095e129d76033c7bde535ca8f0517b4ddaaeda3981b5d8f998f8cf407
SHA5121e1490502069ff5328939cc30a8e1aa74089e9cf918a27c0ce831c877035fe578811fcb970859c88437724c65383e86f055eedad4c14e3699d4270d280b865e8
-
C:\Users\Admin\AppData\Local\Temp\bin.exeFilesize
174KB
MD53ae87cd93196b3f86a2e1cfa3e6c9133
SHA164b444869181c8893d695072239bc48681ea10cd
SHA2560a1b761095e129d76033c7bde535ca8f0517b4ddaaeda3981b5d8f998f8cf407
SHA5121e1490502069ff5328939cc30a8e1aa74089e9cf918a27c0ce831c877035fe578811fcb970859c88437724c65383e86f055eedad4c14e3699d4270d280b865e8
-
C:\Users\Admin\AppData\Roaming\KmBIsnwxko.jsFilesize
117KB
MD50e20eafe54da8cd708fe740ffca1a02d
SHA1c8b05acaf83fd25bc55e0ab01b7df98593c7a5f5
SHA256c0f92a810bb3470ce1fd1e6b532ed371c2bc8d397beb6a29e2ddd68a5ef287b6
SHA512f8a614ddadfb3e350df15884e976dfcfd94af55b614506a351ab02395c52b20c15b7ffd93e2aefedc1a89b17ed4af84256f4920fae6f4cf19862208e612515f4
-
memory/952-57-0x0000000000000000-mapping.dmp
-
memory/952-60-0x0000000000780000-0x0000000000A83000-memory.dmpFilesize
3.0MB
-
memory/952-61-0x0000000000390000-0x00000000003A1000-memory.dmpFilesize
68KB
-
memory/1372-71-0x0000000004C70000-0x0000000004D45000-memory.dmpFilesize
852KB
-
memory/1372-73-0x0000000004C70000-0x0000000004D45000-memory.dmpFilesize
852KB
-
memory/1372-62-0x0000000007060000-0x00000000071AF000-memory.dmpFilesize
1.3MB
-
memory/1492-64-0x0000000076011000-0x0000000076013000-memory.dmpFilesize
8KB
-
memory/1492-63-0x0000000000000000-mapping.dmp
-
memory/1492-66-0x0000000000080000-0x00000000000AC000-memory.dmpFilesize
176KB
-
memory/1492-72-0x0000000000080000-0x00000000000AC000-memory.dmpFilesize
176KB
-
memory/1492-65-0x0000000000860000-0x000000000087F000-memory.dmpFilesize
124KB
-
memory/1492-69-0x0000000001F50000-0x0000000002253000-memory.dmpFilesize
3.0MB
-
memory/1492-70-0x0000000001D40000-0x0000000001DD0000-memory.dmpFilesize
576KB
-
memory/1512-68-0x0000000000000000-mapping.dmp
-
memory/1928-54-0x000007FEFC061000-0x000007FEFC063000-memory.dmpFilesize
8KB
-
memory/2044-55-0x0000000000000000-mapping.dmp