Analysis
-
max time kernel
166s -
max time network
165s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
23-06-2022 05:56
Static task
static1
Behavioral task
behavioral1
Sample
PO_20230025-03662.js
Resource
win7-20220414-en
General
-
Target
PO_20230025-03662.js
-
Size
633KB
-
MD5
9659595bb96500ea6ac6892bcb450d03
-
SHA1
db8e3c13226387bbdd7703abd60baf6e78851789
-
SHA256
dee7026593429404b9cc00a28b12202ecf60049be57f5bf9a0b7dae383055e06
-
SHA512
e6da4a8e7d5e99813d581bb18eee55c9aa629a974412887b1f412f6b860283be68f3d47b16d11ee738c2b8e7500b33c42e24f6d20cfb4175598e0c9c99e3a48c
Malware Config
Extracted
xloader
2.9
vs8g
xEVEsySadSMf8UUC
H8ZbYtGKWPCfp91+uS3TFo/F7tYacwDqHw==
L/St5UjIhTMzEHsb
8h8tDvq0nl8JCWoagxa0MVyvnA==
7bml44z9jZsZx8Co2T8=
EwH88ZtcOu8ehs2P2o6wv78FEe4+xRQ=
bTn3LpE1HfpPAXI=
nYxT+9GLhS1d3zzGJuTDlgpT
HxonIwh8TesenMCo2T8=
Ki83MiehhC9e1i7YQ/Wd32JsGcun
wHcUByFRMuEGh8Co2T8=
86tqpg/Jy60eFmMRPefDlgpT
grSUYa5yahUf8UUC
HVviVsk7Cb6Elc571pnSWCJ93G17PkiI
6LJ1qBPUtGNIl8Co2T8=
AYuWD33xt44VxsCo2T8=
/smXvLMh868VzQqs99/DlgpT
1kEMNVtaMw6KmN+YANYm+kA=
daarti3nbFVKnsCo2T8=
0EJM6cFFHvawA2U=
WZmLjeanlDoDRmMJeRfM
CAnpqoPMmEdBmsCo2T8=
S7NRSknz2IDxrfexzMWcXg==
hbhFvI9GHbYe6lDkMNYm+kA=
ZDYJSK5aKMqTmgGwC9pyCcxc
WBqkiYw6Cq0R1EEHeRbNVMfUWPW+
nDdqqAaRcAQ=
lsLX1cM9FrbMFXIZc/m0MVyvnA==
YceJrx3/7aDcctOaFZQygvVPcl0=
S7Byvh2dXnV5TF0kfw==
zaBZEvt6+etgHQ==
zwcVn349GMs38kfqNPO/MVyvnA==
wi/0NwnAbRwf8UUC
8vYWUbleFPawA2U=
lllK3cr5kDsC
QwHKGfaybiUf8UUC
gGk69u/TalUKIoyTx6PE
6lstUki4iTx4TF0kfw==
1hwVGQl6+etgHQ==
55QxLhZ++etgHQ==
XpUZkHZSGPpPAXI=
b/rRDHMmDMn8lQu9I93DlgpT
grW5q74PiWDh3b3TzoJzZd9Z
HctUSLGkTy0gaK06mjc=
742P/3XnqmZMnMCo2T8=
SwOlZ8q6chM=
XMtX4gaRcAQ=
gqO80CPQo05EmsCo2T8=
jDfY4dVROPVVTF0kfw==
HBcQ9d1lQvL/PYEEPefDlgpT
1FkgSrtsNNTKIJuTx6PE
KKNX0Knpqz0V
JNPadlPYyGVkscCo2T8=
+a2vJgnRyHi2SZJOyJlQn07X7s0acwDqHw==
IE9RTrmihShQ4jrezMWcXg==
+FPcOAZW3vawA2U=
XSH8PZEHwmk2Tp+Tx6PE
0odKiwftyW2aAUnfM9WPZ/RK
Ih8VBfKimjFn/24iVgcM8/VPcl0=
JYeAApzpqz0V
mQGklYL+yXHRpCHTLtYm+kA=
aduCh9uUg2zu60oK
1QcE/VwM0bhnrwCbzzw=
6NujcFnPuV5MnMCo2T8=
madeinfrance.plus
Signatures
-
suricata: ET MALWARE FormBook CnC Checkin (GET)
suricata: ET MALWARE FormBook CnC Checkin (GET)
-
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
suricata: ET MALWARE FormBook CnC Checkin (POST) M2
-
Xloader Payload 6 IoCs
Processes:
resource yara_rule C:\Users\Admin\AppData\Local\Temp\bin.exe xloader C:\Users\Admin\AppData\Local\Temp\bin.exe xloader behavioral2/memory/2684-140-0x00000000012A0000-0x00000000012CC000-memory.dmp xloader behavioral2/memory/2684-143-0x00000000012A0000-0x00000000012CC000-memory.dmp xloader C:\Program Files (x86)\Kjv18itl\gdirzyl.exe xloader C:\Program Files (x86)\Kjv18itl\gdirzyl.exe xloader -
Adds policy Run key to start application 2 TTPs 2 IoCs
Processes:
chkdsk.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run chkdsk.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\9RNHMZL0VND = "C:\\Program Files (x86)\\Kjv18itl\\gdirzyl.exe" chkdsk.exe -
Blocklisted process makes network request 15 IoCs
Processes:
wscript.exeflow pid process 7 3452 wscript.exe 20 3452 wscript.exe 25 3452 wscript.exe 38 3452 wscript.exe 39 3452 wscript.exe 48 3452 wscript.exe 55 3452 wscript.exe 64 3452 wscript.exe 70 3452 wscript.exe 79 3452 wscript.exe 88 3452 wscript.exe 90 3452 wscript.exe 92 3452 wscript.exe 95 3452 wscript.exe 99 3452 wscript.exe -
Executes dropped EXE 2 IoCs
Processes:
bin.exegdirzyl.exepid process 2832 bin.exe 1732 gdirzyl.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
wscript.exebin.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation wscript.exe Key value queried \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Control Panel\International\Geo\Nation bin.exe -
Drops startup file 2 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KmBIsnwxko.js wscript.exe File opened for modification C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\KmBIsnwxko.js wscript.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
wscript.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\Software\Microsoft\Windows\CurrentVersion\Run wscript.exe Set value (str) \REGISTRY\USER\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\YVBPFHTJIQ = "\"C:\\Users\\Admin\\AppData\\Roaming\\KmBIsnwxko.js\"" wscript.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
bin.exechkdsk.exedescription pid process target process PID 2832 set thread context of 3232 2832 bin.exe Explorer.EXE PID 2684 set thread context of 3232 2684 chkdsk.exe Explorer.EXE -
Drops file in Program Files directory 4 IoCs
Processes:
chkdsk.exeExplorer.EXEdescription ioc process File opened for modification C:\Program Files (x86)\Kjv18itl\gdirzyl.exe chkdsk.exe File opened for modification C:\Program Files (x86)\Kjv18itl Explorer.EXE File created C:\Program Files (x86)\Kjv18itl\gdirzyl.exe Explorer.EXE File opened for modification C:\Program Files (x86)\Kjv18itl\gdirzyl.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
chkdsk.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier chkdsk.exe -
Processes:
chkdsk.exedescription ioc process Key created \Registry\User\S-1-5-21-3751123196-3323558407-1869646069-1000\SOFTWARE\Microsoft\Internet Explorer\IntelliForms\Storage2 chkdsk.exe -
Suspicious behavior: EnumeratesProcesses 56 IoCs
Processes:
bin.exechkdsk.exegdirzyl.exepid process 2832 bin.exe 2832 bin.exe 2832 bin.exe 2832 bin.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 1732 gdirzyl.exe 1732 gdirzyl.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
Explorer.EXEpid process 3232 Explorer.EXE -
Suspicious behavior: MapViewOfSection 7 IoCs
Processes:
bin.exechkdsk.exepid process 2832 bin.exe 2832 bin.exe 2832 bin.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe 2684 chkdsk.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
bin.exechkdsk.exegdirzyl.exedescription pid process Token: SeDebugPrivilege 2832 bin.exe Token: SeDebugPrivilege 2684 chkdsk.exe Token: SeDebugPrivilege 1732 gdirzyl.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
wscript.exeExplorer.EXEchkdsk.exedescription pid process target process PID 2068 wrote to memory of 3452 2068 wscript.exe wscript.exe PID 2068 wrote to memory of 3452 2068 wscript.exe wscript.exe PID 2068 wrote to memory of 2832 2068 wscript.exe bin.exe PID 2068 wrote to memory of 2832 2068 wscript.exe bin.exe PID 2068 wrote to memory of 2832 2068 wscript.exe bin.exe PID 3232 wrote to memory of 2684 3232 Explorer.EXE chkdsk.exe PID 3232 wrote to memory of 2684 3232 Explorer.EXE chkdsk.exe PID 3232 wrote to memory of 2684 3232 Explorer.EXE chkdsk.exe PID 2684 wrote to memory of 4260 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 4260 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 4260 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 1148 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 1148 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 1148 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 3228 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 3228 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 3228 2684 chkdsk.exe cmd.exe PID 2684 wrote to memory of 3580 2684 chkdsk.exe Firefox.exe PID 2684 wrote to memory of 3580 2684 chkdsk.exe Firefox.exe PID 2684 wrote to memory of 3580 2684 chkdsk.exe Firefox.exe PID 3232 wrote to memory of 1732 3232 Explorer.EXE gdirzyl.exe PID 3232 wrote to memory of 1732 3232 Explorer.EXE gdirzyl.exe PID 3232 wrote to memory of 1732 3232 Explorer.EXE gdirzyl.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Drops file in Program Files directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
-
C:\Windows\system32\wscript.exewscript.exe C:\Users\Admin\AppData\Local\Temp\PO_20230025-03662.js2⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
-
C:\Windows\System32\wscript.exe"C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\KmBIsnwxko.js"3⤵
- Blocklisted process makes network request
- Drops startup file
- Adds Run key to start application
-
C:\Users\Admin\AppData\Local\Temp\bin.exe"C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
- Executes dropped EXE
- Checks computer location settings
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\chkdsk.exe"C:\Windows\SysWOW64\chkdsk.exe"2⤵
- Adds policy Run key to start application
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Enumerates system info in registry
- Modifies Internet Explorer settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"3⤵
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Windows\SysWOW64\cmd.exe/c copy "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V3⤵
-
C:\Program Files\Mozilla Firefox\Firefox.exe"C:\Program Files\Mozilla Firefox\Firefox.exe"3⤵
-
C:\Program Files (x86)\Kjv18itl\gdirzyl.exe"C:\Program Files (x86)\Kjv18itl\gdirzyl.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files (x86)\Kjv18itl\gdirzyl.exeFilesize
174KB
MD53ae87cd93196b3f86a2e1cfa3e6c9133
SHA164b444869181c8893d695072239bc48681ea10cd
SHA2560a1b761095e129d76033c7bde535ca8f0517b4ddaaeda3981b5d8f998f8cf407
SHA5121e1490502069ff5328939cc30a8e1aa74089e9cf918a27c0ce831c877035fe578811fcb970859c88437724c65383e86f055eedad4c14e3699d4270d280b865e8
-
C:\Program Files (x86)\Kjv18itl\gdirzyl.exeFilesize
174KB
MD53ae87cd93196b3f86a2e1cfa3e6c9133
SHA164b444869181c8893d695072239bc48681ea10cd
SHA2560a1b761095e129d76033c7bde535ca8f0517b4ddaaeda3981b5d8f998f8cf407
SHA5121e1490502069ff5328939cc30a8e1aa74089e9cf918a27c0ce831c877035fe578811fcb970859c88437724c65383e86f055eedad4c14e3699d4270d280b865e8
-
C:\Users\Admin\AppData\Local\Temp\DB1Filesize
40KB
MD5b608d407fc15adea97c26936bc6f03f6
SHA1953e7420801c76393902c0d6bb56148947e41571
SHA256b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf
SHA512cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4
-
C:\Users\Admin\AppData\Local\Temp\DB1Filesize
48KB
MD5349e6eb110e34a08924d92f6b334801d
SHA1bdfb289daff51890cc71697b6322aa4b35ec9169
SHA256c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a
SHA5122a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574
-
C:\Users\Admin\AppData\Local\Temp\bin.exeFilesize
174KB
MD53ae87cd93196b3f86a2e1cfa3e6c9133
SHA164b444869181c8893d695072239bc48681ea10cd
SHA2560a1b761095e129d76033c7bde535ca8f0517b4ddaaeda3981b5d8f998f8cf407
SHA5121e1490502069ff5328939cc30a8e1aa74089e9cf918a27c0ce831c877035fe578811fcb970859c88437724c65383e86f055eedad4c14e3699d4270d280b865e8
-
C:\Users\Admin\AppData\Local\Temp\bin.exeFilesize
174KB
MD53ae87cd93196b3f86a2e1cfa3e6c9133
SHA164b444869181c8893d695072239bc48681ea10cd
SHA2560a1b761095e129d76033c7bde535ca8f0517b4ddaaeda3981b5d8f998f8cf407
SHA5121e1490502069ff5328939cc30a8e1aa74089e9cf918a27c0ce831c877035fe578811fcb970859c88437724c65383e86f055eedad4c14e3699d4270d280b865e8
-
C:\Users\Admin\AppData\Roaming\KmBIsnwxko.jsFilesize
117KB
MD50e20eafe54da8cd708fe740ffca1a02d
SHA1c8b05acaf83fd25bc55e0ab01b7df98593c7a5f5
SHA256c0f92a810bb3470ce1fd1e6b532ed371c2bc8d397beb6a29e2ddd68a5ef287b6
SHA512f8a614ddadfb3e350df15884e976dfcfd94af55b614506a351ab02395c52b20c15b7ffd93e2aefedc1a89b17ed4af84256f4920fae6f4cf19862208e612515f4
-
memory/1148-147-0x0000000000000000-mapping.dmp
-
memory/1732-154-0x0000000001590000-0x00000000018DA000-memory.dmpFilesize
3.3MB
-
memory/1732-151-0x0000000000000000-mapping.dmp
-
memory/2684-140-0x00000000012A0000-0x00000000012CC000-memory.dmpFilesize
176KB
-
memory/2684-141-0x0000000001B30000-0x0000000001E7A000-memory.dmpFilesize
3.3MB
-
memory/2684-139-0x0000000000350000-0x000000000035A000-memory.dmpFilesize
40KB
-
memory/2684-143-0x00000000012A0000-0x00000000012CC000-memory.dmpFilesize
176KB
-
memory/2684-144-0x0000000001890000-0x0000000001920000-memory.dmpFilesize
576KB
-
memory/2684-138-0x0000000000000000-mapping.dmp
-
memory/2832-136-0x00000000014C0000-0x00000000014D1000-memory.dmpFilesize
68KB
-
memory/2832-135-0x00000000019C0000-0x0000000001D0A000-memory.dmpFilesize
3.3MB
-
memory/2832-132-0x0000000000000000-mapping.dmp
-
memory/3228-149-0x0000000000000000-mapping.dmp
-
memory/3232-137-0x0000000007C70000-0x0000000007DCB000-memory.dmpFilesize
1.4MB
-
memory/3232-146-0x0000000007E30000-0x0000000007F73000-memory.dmpFilesize
1.3MB
-
memory/3232-145-0x0000000007E30000-0x0000000007F73000-memory.dmpFilesize
1.3MB
-
memory/3452-130-0x0000000000000000-mapping.dmp
-
memory/4260-142-0x0000000000000000-mapping.dmp