Resubmissions

16-01-2023 09:37

230116-llrjgsgh6x 10

16-01-2023 09:32

230116-lhl5lagg9t 10

Analysis

  • max time kernel
    156s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-01-2023 09:32

General

  • Target

    yeni siparis listesi.exe

  • Size

    816KB

  • MD5

    6b0f23e56a98160ef61e1864227b0617

  • SHA1

    08b5e21bce19e406d182478a67bad6462b86a887

  • SHA256

    7f354681e9ec602aef4dcdedfc3eb05a8f1a777b3691ae4d9d58e78240d49fe8

  • SHA512

    961da7bd43e5fdf0f411fc4634614191be3e4e928d21e4a0c16d45b3f9dc7fed79079fc7bd3aff57883a77c48874b3e28ea8e590d57c6ac83f0a6c74fc63de40

  • SSDEEP

    12288:hvTirPykFC+EQpA7EOiidyVMmfP8DspvZFVphCF807ldv8gUwowEl52joHDL4wk:aPVFn/A7vsV/f6MvvV+maKN5RA

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Signatures

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • ModiLoader Second Stage 1 IoCs
  • Xloader payload 4 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2348
    • C:\Users\Admin\AppData\Local\Temp\yeni siparis listesi.exe
      "C:\Users\Admin\AppData\Local\Temp\yeni siparis listesi.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:3036
      • C:\Windows\SysWOW64\iexpress.exe
        C:\Windows\System32\iexpress.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4924
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3396
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\iexpress.exe"
        3⤵
          PID:4780

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2348-140-0x0000000002FD0000-0x00000000030C5000-memory.dmp
      Filesize

      980KB

    • memory/2348-150-0x0000000008250000-0x0000000008310000-memory.dmp
      Filesize

      768KB

    • memory/2348-149-0x0000000008250000-0x0000000008310000-memory.dmp
      Filesize

      768KB

    • memory/3036-135-0x0000000010410000-0x000000001043B000-memory.dmp
      Filesize

      172KB

    • memory/3036-136-0x0000000010410000-0x000000001043B000-memory.dmp
      Filesize

      172KB

    • memory/3036-132-0x0000000003040000-0x000000000306C000-memory.dmp
      Filesize

      176KB

    • memory/3396-146-0x0000000000A50000-0x0000000000A7B000-memory.dmp
      Filesize

      172KB

    • memory/3396-141-0x0000000000000000-mapping.dmp
    • memory/3396-144-0x0000000000A00000-0x0000000000A0B000-memory.dmp
      Filesize

      44KB

    • memory/3396-145-0x0000000001440000-0x000000000178A000-memory.dmp
      Filesize

      3.3MB

    • memory/3396-147-0x0000000000A50000-0x0000000000A7B000-memory.dmp
      Filesize

      172KB

    • memory/3396-148-0x00000000011D0000-0x0000000001260000-memory.dmp
      Filesize

      576KB

    • memory/4780-143-0x0000000000000000-mapping.dmp
    • memory/4924-142-0x0000000010410000-0x000000001043B000-memory.dmp
      Filesize

      172KB

    • memory/4924-139-0x00000000040D0000-0x00000000040E1000-memory.dmp
      Filesize

      68KB

    • memory/4924-137-0x00000000041F0000-0x000000000453A000-memory.dmp
      Filesize

      3.3MB

    • memory/4924-134-0x0000000000000000-mapping.dmp