Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    10-07-2020 09:17

General

  • Target

    quotation List #039.pdf.exe

  • Size

    325KB

  • MD5

    2b1b6a99d9427ced3bcaaf141dd36b34

  • SHA1

    43e55e4c97dd72e3186e1849242f3cd62d991bd6

  • SHA256

    36f76be816898a8ac90603edeed2ff90983d062f047f6e00c66d54964c582cc8

  • SHA512

    1b73afad027bf565e0e4007ee5c6d0cd5b2420182c4de7179dcef7f7f91789aabab8a2b4efd17a5cd50432c3598ced5058130104daa57d9f0f8b71c4fd41b1fa

Malware Config

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Adds Run entry to start application 2 TTPs 2 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\quotation List #039.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\quotation List #039.pdf.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetThreadContext
      PID:1628
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      • Modifies Internet Explorer settings
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Adds Run entry to start application
      PID:1568
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\quotation List #039.pdf.exe"
        3⤵
          PID:2768
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:4044

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1568-1-0x00000000011B0000-0x0000000001323000-memory.dmp

        Filesize

        1.4MB

      • memory/1568-2-0x00000000011B0000-0x0000000001323000-memory.dmp

        Filesize

        1.4MB

      • memory/1568-4-0x0000000006320000-0x000000000642E000-memory.dmp

        Filesize

        1.1MB