Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    30-06-2020 05:23

General

  • Target

    PO389732.exe

  • Size

    325KB

  • MD5

    4cd3bc98fa3df22248c7e5d63dbe1168

  • SHA1

    fb32e85f940945c6c0d3052b80f48f5bc48f7c7d

  • SHA256

    cde5b9157162c55139f508884d7be6be903acc9d85842a667c1b2ef04a1ecd49

  • SHA512

    0b2d2ada876da8ae777b80f2b99895b62449052e723ef5c6a71d02c317dc6c34346f1a35ea875149f2ebd94b775a7b8e3f2e712e2765e0e2fe82c2ec7376896e

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 20 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • System policy modification 1 TTPs 1 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Adds Run entry to policy start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SendNotifyMessage
    • Suspicious use of FindShellTrayWindow
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\PO389732.exe
      "C:\Users\Admin\AppData\Local\Temp\PO389732.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetThreadContext
      PID:1528
      • C:\Users\Admin\AppData\Local\Temp\PO389732.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1860
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • System policy modification
      • Drops file in Program Files directory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Adds Run entry to policy start application
      • Modifies Internet Explorer settings
      PID:1872
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PO389732.exe"
        3⤵
        • Deletes itself
        PID:1772
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1732

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1316-4-0x00000000069E0000-0x0000000006B3D000-memory.dmp
      Filesize

      1.4MB

    • memory/1528-1-0x0000000000000000-0x0000000000000000-disk.dmp
    • memory/1732-10-0x0000000000000000-mapping.dmp
    • memory/1732-11-0x000000013F5F0000-0x000000013F683000-memory.dmp
      Filesize

      588KB

    • memory/1772-7-0x0000000000000000-mapping.dmp
    • memory/1860-2-0x0000000000400000-0x0000000000427000-memory.dmp
      Filesize

      156KB

    • memory/1860-3-0x000000000041C160-mapping.dmp
    • memory/1872-5-0x0000000000000000-mapping.dmp
    • memory/1872-6-0x0000000000920000-0x0000000000928000-memory.dmp
      Filesize

      32KB

    • memory/1872-8-0x0000000001A00000-0x0000000001B07000-memory.dmp
      Filesize

      1.0MB

    • memory/1872-9-0x0000000003A30000-0x0000000003B59000-memory.dmp
      Filesize

      1.2MB