Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    30-06-2020 06:23

General

  • Target

    Order557780.exe

  • Size

    243KB

  • MD5

    dd519c0d1e2e1a3e5a08a64adaab1f02

  • SHA1

    64b925f35c298589ea8aaef72988aae5b2cda640

  • SHA256

    f3d5008245805011d86543821b4f62b50e5e5800aec8d949a5f605e9e17836af

  • SHA512

    c39ef6ee8da08aa803e538a1645456111d5e0dc58efc5244739814d7707c66d0b691af875b514022f9efa9773c699ac91377581c88af31b510d184f61429bd02

Malware Config

Signatures

  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Drops file in Program Files directory 1 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\Order557780.exe
      "C:\Users\Admin\AppData\Local\Temp\Order557780.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2536
      • C:\Users\Admin\AppData\Local\Temp\Order557780.exe
        "C:\Users\Admin\AppData\Local\Temp\Order557780.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1232
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:1524
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Modifies Internet Explorer settings
        • Drops file in Program Files directory
        • Suspicious use of WriteProcessMemory
        • Adds Run entry to start application
        • Suspicious use of AdjustPrivilegeToken
        PID:2196
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Order557780.exe"
          3⤵
            PID:2312
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:3924
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              3⤵
                PID:3932

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          2
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\DB1
          • C:\Users\Admin\AppData\Roaming\25R-4D3F\25Rlogim.jpeg
          • C:\Users\Admin\AppData\Roaming\25R-4D3F\25Rlogrf.ini
          • C:\Users\Admin\AppData\Roaming\25R-4D3F\25Rlogrg.ini
          • C:\Users\Admin\AppData\Roaming\25R-4D3F\25Rlogri.ini
          • C:\Users\Admin\AppData\Roaming\25R-4D3F\25Rlogrv.ini
          • memory/1232-1-0x000000000041E300-mapping.dmp
          • memory/1232-0-0x0000000000400000-0x0000000000433000-memory.dmp
            Filesize

            204KB

          • memory/2196-11-0x0000000007090000-0x00000000071F4000-memory.dmp
            Filesize

            1.4MB

          • memory/2196-7-0x0000000003940000-0x0000000003A16000-memory.dmp
            Filesize

            856KB

          • memory/2196-5-0x0000000001100000-0x000000000110C000-memory.dmp
            Filesize

            48KB

          • memory/2196-4-0x0000000001100000-0x000000000110C000-memory.dmp
            Filesize

            48KB

          • memory/2196-3-0x0000000000000000-mapping.dmp
          • memory/2312-6-0x0000000000000000-mapping.dmp
          • memory/3012-8-0x0000000004C80000-0x0000000004E1A000-memory.dmp
            Filesize

            1.6MB

          • memory/3924-9-0x0000000000000000-mapping.dmp
          • memory/3932-12-0x0000000000000000-mapping.dmp
          • memory/3932-13-0x00007FF7F2D60000-0x00007FF7F2DF3000-memory.dmp
            Filesize

            588KB

          • memory/3932-14-0x00007FF7F2D60000-0x00007FF7F2DF3000-memory.dmp
            Filesize

            588KB

          • memory/3932-15-0x00007FF7F2D60000-0x00007FF7F2DF3000-memory.dmp
            Filesize

            588KB