Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-07-2022 20:09

General

  • Target

    Drawing Image PDF.exe

  • Size

    713KB

  • MD5

    d7ce2f78a17847431c921087487a8b91

  • SHA1

    3a2b899ebfdac8a82b66bd95c4838162e066672e

  • SHA256

    db4c0badc999b10f0dae3d1d80b59c3748de2f6f913fb7bff2d9303e4396a1b4

  • SHA512

    519fd6855a7a22e42e363955593c108d498b2528dd8d3bc2bff2eaf7236be4af83d14c2c3cb90a347ce851286ac3859322cba7e8fed84e4873be29547223f47c

Malware Config

Extracted

Family

xloader

Version

2.9

Campaign

k25e

Decoy

Xvh6mA98aHhdW5PD

XpSglwzNIOqe9g==

RWuFLgQ7oCzN4U/2/A==

nf6FGPYyk+veLC0=

FnN4A9ALIOqe9g==

kcXTjYT8eRm8DQOuLW8mYOG8eN8=

yryblm3yv9iO+HZOTbxhSw/FtNcRng==

ZRazQ2DW84uiZaiw6w==

Is1fie9gWoUuX+Czzuk=

lV9ffbe7SO6B

Pj79m1gaBi8Fajo=

tTdnWml24M1Y4Q==

Zq3U8oC/5/SW

l2f5LrEsED3jSoYw/zoy2Q==

oM3TbW/saRS2N3Yqzi31mZoiw9go9Ck=

AyPthJYMGC4dRr3a

uJNV6qnUOsB4lGP6oRHjc00=

09OYj9e/5/SW

9UFZgN4YDzDkQTvg4KFqn2facZ19aGuv

F5PHzC1g0IBdW5PD

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Xloader Payload 5 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\Drawing Image PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\Drawing Image PDF.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1228
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:708
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1740

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/708-72-0x0000000000000000-mapping.dmp
      • memory/948-54-0x0000000000F90000-0x0000000001048000-memory.dmp
        Filesize

        736KB

      • memory/948-55-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
        Filesize

        8KB

      • memory/948-56-0x0000000000540000-0x000000000054A000-memory.dmp
        Filesize

        40KB

      • memory/948-57-0x0000000005410000-0x0000000005494000-memory.dmp
        Filesize

        528KB

      • memory/948-58-0x00000000005B0000-0x00000000005E2000-memory.dmp
        Filesize

        200KB

      • memory/1228-66-0x00000000008A0000-0x0000000000BA3000-memory.dmp
        Filesize

        3.0MB

      • memory/1228-59-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1228-63-0x000000000041F680-mapping.dmp
      • memory/1228-65-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1228-60-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1228-67-0x0000000000220000-0x0000000000231000-memory.dmp
        Filesize

        68KB

      • memory/1228-62-0x0000000000400000-0x000000000042C000-memory.dmp
        Filesize

        176KB

      • memory/1256-68-0x0000000006600000-0x00000000066E7000-memory.dmp
        Filesize

        924KB

      • memory/1256-75-0x00000000068D0000-0x00000000069CA000-memory.dmp
        Filesize

        1000KB

      • memory/1256-77-0x00000000068D0000-0x00000000069CA000-memory.dmp
        Filesize

        1000KB

      • memory/1744-69-0x0000000000000000-mapping.dmp
      • memory/1744-70-0x00000000002B0000-0x00000000002D2000-memory.dmp
        Filesize

        136KB

      • memory/1744-71-0x00000000001D0000-0x00000000001FC000-memory.dmp
        Filesize

        176KB

      • memory/1744-73-0x0000000001F90000-0x0000000002293000-memory.dmp
        Filesize

        3.0MB

      • memory/1744-74-0x00000000004A0000-0x0000000000530000-memory.dmp
        Filesize

        576KB

      • memory/1744-76-0x00000000001D0000-0x00000000001FC000-memory.dmp
        Filesize

        176KB