Analysis

  • max time kernel
    147s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 10:33

General

  • Target

    SecuriteInfo.com.Win32.InjectorX-gen.5219.3582.exe

  • Size

    1.0MB

  • MD5

    90c725f0f378bbdd4c73b4c59f3e741d

  • SHA1

    f3975204ca0bb283270afeaf4038111fca3933aa

  • SHA256

    c84d9cb4b4e037cbaf9632d4cdd0f493d2c5e0b5f6308fe97f84f04b501155c8

  • SHA512

    984e06aacb291741fc3a8de194c455155a13bb8ccb4d76dc938550fa04fc8377306f1e6ccf234d9d2e39924d71bfc9b1a8e1e1bc4b3fbc45b4a470282ca7b45b

  • SSDEEP

    24576:JR6gr/LZizjzo/BMR92kB6NhMhtrjxLF7Z+/ronB:JX/4R8th+1lLF0MnB

Malware Config

Extracted

Family

xloader

Version

2.5

Campaign

euv4

Decoy

anniebapartments.com

hagenbicycles.com

herbalist101.com

southerncorrosion.net

kuechenpruefer.com

tajniezdrzi.quest

segurofunerarioar.com

boardsandbeamsdecor.com

alifdanismanlik.com

pkem.top

mddc.clinic

handejqr.com

crux-at.com

awp.email

hugsforbubbs.com

cielotherepy.com

turkcuyuz.com

teamidc.com

lankasirinspa.com

68135.online

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • ModiLoader Second Stage 1 IoCs
  • Xloader payload 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.InjectorX-gen.5219.3582.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.InjectorX-gen.5219.3582.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2492
      • C:\Windows\SysWOW64\colorcpl.exe
        C:\Windows\System32\colorcpl.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2132
    • C:\Windows\SysWOW64\WWAHost.exe
      "C:\Windows\SysWOW64\WWAHost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3844
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\colorcpl.exe"
        3⤵
          PID:4744

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2132-134-0x0000000000000000-mapping.dmp
    • memory/2132-138-0x0000000010410000-0x0000000010439000-memory.dmp
      Filesize

      164KB

    • memory/2132-139-0x00000000048E0000-0x0000000004C2A000-memory.dmp
      Filesize

      3.3MB

    • memory/2132-140-0x00000000047E0000-0x00000000047F1000-memory.dmp
      Filesize

      68KB

    • memory/2492-135-0x0000000010410000-0x0000000010439000-memory.dmp
      Filesize

      164KB

    • memory/2492-136-0x0000000010410000-0x0000000010439000-memory.dmp
      Filesize

      164KB

    • memory/2492-132-0x0000000002550000-0x000000000257B000-memory.dmp
      Filesize

      172KB

    • memory/2740-148-0x0000000003660000-0x0000000003713000-memory.dmp
      Filesize

      716KB

    • memory/2740-141-0x00000000032B0000-0x0000000003383000-memory.dmp
      Filesize

      844KB

    • memory/2740-150-0x0000000003660000-0x0000000003713000-memory.dmp
      Filesize

      716KB

    • memory/3844-142-0x0000000000000000-mapping.dmp
    • memory/3844-145-0x0000000001D60000-0x00000000020AA000-memory.dmp
      Filesize

      3.3MB

    • memory/3844-147-0x0000000001A90000-0x0000000001B20000-memory.dmp
      Filesize

      576KB

    • memory/3844-144-0x0000000000D30000-0x0000000000D59000-memory.dmp
      Filesize

      164KB

    • memory/3844-149-0x0000000000D30000-0x0000000000D59000-memory.dmp
      Filesize

      164KB

    • memory/3844-143-0x0000000000650000-0x000000000072C000-memory.dmp
      Filesize

      880KB

    • memory/4744-146-0x0000000000000000-mapping.dmp