Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-07-2022 20:07

General

  • Target

    Drawing Image PDF.exe

  • Size

    713KB

  • MD5

    d7ce2f78a17847431c921087487a8b91

  • SHA1

    3a2b899ebfdac8a82b66bd95c4838162e066672e

  • SHA256

    db4c0badc999b10f0dae3d1d80b59c3748de2f6f913fb7bff2d9303e4396a1b4

  • SHA512

    519fd6855a7a22e42e363955593c108d498b2528dd8d3bc2bff2eaf7236be4af83d14c2c3cb90a347ce851286ac3859322cba7e8fed84e4873be29547223f47c

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

k25e

Decoy

Xvh6mA98aHhdW5PD

XpSglwzNIOqe9g==

RWuFLgQ7oCzN4U/2/A==

nf6FGPYyk+veLC0=

FnN4A9ALIOqe9g==

kcXTjYT8eRm8DQOuLW8mYOG8eN8=

yryblm3yv9iO+HZOTbxhSw/FtNcRng==

ZRazQ2DW84uiZaiw6w==

Is1fie9gWoUuX+Czzuk=

lV9ffbe7SO6B

Pj79m1gaBi8Fajo=

tTdnWml24M1Y4Q==

Zq3U8oC/5/SW

l2f5LrEsED3jSoYw/zoy2Q==

oM3TbW/saRS2N3Yqzi31mZoiw9go9Ck=

AyPthJYMGC4dRr3a

uJNV6qnUOsB4lGP6oRHjc00=

09OYj9e/5/SW

9UFZgN4YDzDkQTvg4KFqn2facZ19aGuv

F5PHzC1g0IBdW5PD

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\Drawing Image PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Drawing Image PDF.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1996
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:364
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1500

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/364-70-0x0000000000000000-mapping.dmp
      • memory/1280-76-0x00000000000C0000-0x00000000000EC000-memory.dmp
        Filesize

        176KB

      • memory/1280-72-0x0000000000B30000-0x0000000000E33000-memory.dmp
        Filesize

        3.0MB

      • memory/1280-68-0x0000000000000000-mapping.dmp
      • memory/1280-73-0x00000000000C0000-0x00000000000EC000-memory.dmp
        Filesize

        176KB

      • memory/1280-74-0x0000000000860000-0x00000000008F0000-memory.dmp
        Filesize

        576KB

      • memory/1280-71-0x0000000000EE0000-0x0000000000EED000-memory.dmp
        Filesize

        52KB

      • memory/1320-77-0x0000000006490000-0x00000000065FC000-memory.dmp
        Filesize

        1.4MB

      • memory/1320-75-0x0000000006490000-0x00000000065FC000-memory.dmp
        Filesize

        1.4MB

      • memory/1320-67-0x0000000003D10000-0x0000000003E12000-memory.dmp
        Filesize

        1.0MB

      • memory/1936-54-0x0000000001180000-0x0000000001238000-memory.dmp
        Filesize

        736KB

      • memory/1936-58-0x0000000000B60000-0x0000000000B92000-memory.dmp
        Filesize

        200KB

      • memory/1936-57-0x00000000060F0000-0x0000000006174000-memory.dmp
        Filesize

        528KB

      • memory/1936-56-0x0000000000520000-0x000000000052A000-memory.dmp
        Filesize

        40KB

      • memory/1936-55-0x00000000757C1000-0x00000000757C3000-memory.dmp
        Filesize

        8KB

      • memory/1996-59-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1996-69-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1996-66-0x00000000001A0000-0x00000000001B1000-memory.dmp
        Filesize

        68KB

      • memory/1996-64-0x0000000000B50000-0x0000000000E53000-memory.dmp
        Filesize

        3.0MB

      • memory/1996-63-0x000000000041F680-mapping.dmp
      • memory/1996-62-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1996-60-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB