Analysis

  • max time kernel
    146s
  • max time network
    126s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    10/07/2020, 11:52

General

  • Target

    winlog.exe

  • Size

    341KB

  • MD5

    2fafa52942af93554281b81a68b681f4

  • SHA1

    33d7ed40057254ce4bcb87850febff71d46177c0

  • SHA256

    1940c74c0c28f1bc9e66ffc90e00094601b5c2f7a68f1a034626ccf4969d54c8

  • SHA512

    ca21c2390d9fa73f9b552384da0b6001cde589904dce687dec21f711830038a0526e2e784936a938f564624351a6bafcba25613cc7858e987f74ba07f05447c1

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run entry to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of WriteProcessMemory 99 IoCs
  • Suspicious behavior: EnumeratesProcesses 45 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Drops file in Program Files directory 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\winlog.exe
      "C:\Users\Admin\AppData\Local\Temp\winlog.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:640
      • C:\Windows\SysWOW64\rundll32.exe
        C:\Windows\system32\rundll32.exe Ulotrichy,Screening
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        PID:852
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\system32\cmd.exe"
          4⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetThreadContext
          PID:392
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Adds Run entry to start application
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      PID:3772
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\cmd.exe"
        3⤵
          PID:1852
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:424
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:3744

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/3744-16-0x00007FF7C03D0000-0x00007FF7C0463000-memory.dmp

          Filesize

          588KB

        • memory/3744-17-0x00007FF7C03D0000-0x00007FF7C0463000-memory.dmp

          Filesize

          588KB

        • memory/3744-18-0x00007FF7C03D0000-0x00007FF7C0463000-memory.dmp

          Filesize

          588KB

        • memory/3772-8-0x0000000001180000-0x0000000001196000-memory.dmp

          Filesize

          88KB

        • memory/3772-9-0x0000000001180000-0x0000000001196000-memory.dmp

          Filesize

          88KB

        • memory/3772-11-0x00000000055B0000-0x00000000056ED000-memory.dmp

          Filesize

          1.2MB

        • memory/3772-14-0x0000000006120000-0x00000000062AC000-memory.dmp

          Filesize

          1.5MB