Analysis

  • max time kernel
    161s
  • max time network
    167s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2022 19:23

General

  • Target

    SecuriteInfo.com.Variant.Jaik.98838.18911.25277.exe

  • Size

    755KB

  • MD5

    b77f9fb39917242ae1497bb6d2138546

  • SHA1

    7f0eed2929918d57d20d757014017c0940fd9b10

  • SHA256

    ca3fa8d98e70c9b1cc6c6236e0d07303d9fb5e76dd82927400d15fd57c3ad647

  • SHA512

    d98096a986fc029b0f53ad2612bbbdf61f36361de9542b06de1bb43c7e3cb277e4047f7dac2e76a0e3e1b06a78ed03ebecdde34e72175e197051c81afd3955ca

  • SSDEEP

    12288:dMtnZYA3k+tEeWqFZip4Be+GA7Pes9q1ia9r0vYe+mY6Q4eYrP:WZY5+tEeWqFZip4B57Pd9qlqC6Q

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • ModiLoader Second Stage 63 IoCs
  • Xloader payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2640
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Jaik.98838.18911.25277.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Variant.Jaik.98838.18911.25277.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4208
      • C:\Windows\SysWOW64\colorcpl.exe
        C:\Windows\System32\colorcpl.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1836
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1868
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\colorcpl.exe"
        3⤵
          PID:3168
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:2452

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1836-324-0x0000000010410000-0x000000001043B000-memory.dmp
        Filesize

        172KB

      • memory/1836-326-0x0000000004C60000-0x0000000004FAA000-memory.dmp
        Filesize

        3.3MB

      • memory/1836-327-0x0000000004BC0000-0x0000000004BD1000-memory.dmp
        Filesize

        68KB

      • memory/1836-251-0x0000000000000000-mapping.dmp
      • memory/1836-330-0x0000000010410000-0x000000001043B000-memory.dmp
        Filesize

        172KB

      • memory/1868-332-0x0000000000720000-0x0000000000747000-memory.dmp
        Filesize

        156KB

      • memory/1868-329-0x0000000000000000-mapping.dmp
      • memory/1868-337-0x0000000001200000-0x000000000122B000-memory.dmp
        Filesize

        172KB

      • memory/1868-335-0x0000000002F50000-0x0000000002FE0000-memory.dmp
        Filesize

        576KB

      • memory/1868-331-0x0000000003220000-0x000000000356A000-memory.dmp
        Filesize

        3.3MB

      • memory/1868-333-0x0000000001200000-0x000000000122B000-memory.dmp
        Filesize

        172KB

      • memory/2452-339-0x0000000000000000-mapping.dmp
      • memory/2640-328-0x0000000008680000-0x00000000087B1000-memory.dmp
        Filesize

        1.2MB

      • memory/2640-336-0x00000000091B0000-0x00000000092F6000-memory.dmp
        Filesize

        1.3MB

      • memory/2640-338-0x00000000091B0000-0x00000000092F6000-memory.dmp
        Filesize

        1.3MB

      • memory/3168-334-0x0000000000000000-mapping.dmp
      • memory/4208-166-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-175-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-146-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-148-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-147-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-150-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-149-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-152-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-151-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-154-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-153-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-156-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-155-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-158-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-161-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-160-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-159-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-157-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-162-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-163-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-164-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-165-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-145-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-167-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-168-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-170-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-169-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-172-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-173-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-171-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-174-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-144-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-176-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-177-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-178-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-179-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-180-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-181-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-182-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-183-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-184-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-185-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-186-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-187-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-188-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-189-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-190-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-143-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-141-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-142-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-140-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-139-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-138-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-136-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-137-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-135-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-134-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-132-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-191-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-192-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-193-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-195-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB

      • memory/4208-194-0x0000000002850000-0x000000000287A000-memory.dmp
        Filesize

        168KB