Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22-07-2022 14:58

General

  • Target

    tmp.exe

  • Size

    517KB

  • MD5

    a09f93f7606aa64851c9a8f82317b72f

  • SHA1

    c33ea2eb219a088610847905251e5e2c3d2c87a2

  • SHA256

    c9777cb78779de98104f1a01584f9df07e39b7ace7d5e6686d225e7261bd9447

  • SHA512

    c5923ec47cc02a048fbbe8876c6f982d56dd6ea8936848db5a51ec6ad8ce16df9271a00c187a9ea653beaa490ba769c1339a5c3384180ba4d3961c471b7dfd59

Malware Config

Extracted

Family

xloader

Version

2.8

Campaign

nn40

Decoy

LYAg0yANOGEAGeaFOrA/

MQWuERZplP+VZy/uszI=

CF0oDN0JimIaGy/uszI=

ltJnyC+ReohYaiTvj1qbEA==

B9OkgdctVKBAFjSUaw==

sbDVwSZVVqVB11/deow8GA==

v1gHDe0pzno=

i+/0n2vHUfGPR98k77tukZ90MQ==

SUtCnbS96Qm21g==

8X9qzyt1dpAo31jXrXfKb49fBPY=

5KlPxqHzSstuFjSUaw==

0r/Kesv/zuanroxvNQW0Gm8=

FFgS7kfPYAqpdhhgRgnBJHY=

LgusAHrkrIoWr0FWIe2o/04UXPw=

vBq9Gvxa9wbKbS/uszI=

Z+q6HAZNNeqwwQ==

wbS4fMb06SjU5Kbseow8GA==

1mZEuZvJ/m0L9bof56PkkZ90MQ==

JCJIM74lHk/o+tiFOrA/

d14FrM8rGEgIzVkT67+3XaEh

Signatures

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Xloader payload 3 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4204
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:1856
        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3080
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:4304
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:4792
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:4092
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:2948
              • C:\Windows\SysWOW64\wlanext.exe
                "C:\Windows\SysWOW64\wlanext.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:4036
                • C:\Windows\SysWOW64\cmd.exe
                  /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                  3⤵
                    PID:4748
                  • C:\Windows\SysWOW64\cmd.exe
                    /c copy "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                    3⤵
                      PID:2476
                    • C:\Program Files\Mozilla Firefox\Firefox.exe
                      "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      3⤵
                        PID:4724

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  1
                  T1012

                  System Information Discovery

                  1
                  T1082

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\DB1
                    Filesize

                    40KB

                    MD5

                    b608d407fc15adea97c26936bc6f03f6

                    SHA1

                    953e7420801c76393902c0d6bb56148947e41571

                    SHA256

                    b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

                    SHA512

                    cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

                  • C:\Users\Admin\AppData\Local\Temp\DB1
                    Filesize

                    48KB

                    MD5

                    349e6eb110e34a08924d92f6b334801d

                    SHA1

                    bdfb289daff51890cc71697b6322aa4b35ec9169

                    SHA256

                    c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                    SHA512

                    2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                  • memory/1856-135-0x0000000000000000-mapping.dmp
                  • memory/2476-152-0x0000000000000000-mapping.dmp
                  • memory/2700-141-0x00000000084C0000-0x0000000008650000-memory.dmp
                    Filesize

                    1.6MB

                  • memory/2700-148-0x00000000033A0000-0x00000000034A0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/2700-149-0x00000000033A0000-0x00000000034A0000-memory.dmp
                    Filesize

                    1024KB

                  • memory/3080-140-0x0000000001550000-0x0000000001561000-memory.dmp
                    Filesize

                    68KB

                  • memory/3080-143-0x0000000000400000-0x000000000042C000-memory.dmp
                    Filesize

                    176KB

                  • memory/3080-136-0x0000000000000000-mapping.dmp
                  • memory/3080-137-0x0000000000400000-0x000000000042C000-memory.dmp
                    Filesize

                    176KB

                  • memory/3080-139-0x0000000001580000-0x00000000018CA000-memory.dmp
                    Filesize

                    3.3MB

                  • memory/4036-142-0x0000000000000000-mapping.dmp
                  • memory/4036-144-0x0000000000AA0000-0x0000000000DEA000-memory.dmp
                    Filesize

                    3.3MB

                  • memory/4036-146-0x0000000000120000-0x000000000014C000-memory.dmp
                    Filesize

                    176KB

                  • memory/4036-145-0x0000000000270000-0x0000000000287000-memory.dmp
                    Filesize

                    92KB

                  • memory/4036-147-0x0000000000910000-0x00000000009A0000-memory.dmp
                    Filesize

                    576KB

                  • memory/4204-130-0x00000000001F0000-0x0000000000278000-memory.dmp
                    Filesize

                    544KB

                  • memory/4204-134-0x000000000AC80000-0x000000000AD1C000-memory.dmp
                    Filesize

                    624KB

                  • memory/4204-133-0x00000000070F0000-0x00000000070FA000-memory.dmp
                    Filesize

                    40KB

                  • memory/4204-132-0x0000000007170000-0x0000000007202000-memory.dmp
                    Filesize

                    584KB

                  • memory/4204-131-0x0000000007680000-0x0000000007C24000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4748-150-0x0000000000000000-mapping.dmp