Analysis

  • max time kernel
    145s
  • max time network
    141s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    16/07/2020, 09:22

General

  • Target

    PURCHASE ORDER.exe

  • Size

    534KB

  • MD5

    30a88aaca2412bcc3914382dce41ae1a

  • SHA1

    4abbc932878a42eec7a438fc383370e83ea43d7e

  • SHA256

    57234a3ec3bf2d3e6539a25221595d791fcf68dbed39a942651819c74fc3c664

  • SHA512

    8db262de282eaa5471963eae4f08729b21728cf783184d819221fba6283153817aa71f8a7f22f0d6ee24bd123fd2b9dfea9fb20c46db1a62710ebdaab3958b94

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Drops file in Program Files directory 1 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of AdjustPrivilegeToken
    PID:2992
    • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe
      "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetThreadContext
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe
        "{path}"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of SetThreadContext
        PID:2068
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: MapViewOfSection
      • Adds policy Run key to start application
      • Modifies Internet Explorer settings
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • System policy modification
      PID:2196
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER.exe"
        3⤵
          PID:2752
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:3836
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:3728

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/2068-4-0x0000000000400000-0x000000000042D000-memory.dmp

          Filesize

          180KB

        • memory/2196-8-0x0000000000D70000-0x0000000000D89000-memory.dmp

          Filesize

          100KB

        • memory/2196-13-0x0000000005860000-0x00000000058F3000-memory.dmp

          Filesize

          588KB

        • memory/2196-10-0x0000000005760000-0x0000000005850000-memory.dmp

          Filesize

          960KB

        • memory/2196-7-0x0000000000D70000-0x0000000000D89000-memory.dmp

          Filesize

          100KB

        • memory/3728-15-0x00007FF6A9CC0000-0x00007FF6A9D53000-memory.dmp

          Filesize

          588KB

        • memory/3728-16-0x00007FF6A9CC0000-0x00007FF6A9D53000-memory.dmp

          Filesize

          588KB

        • memory/3728-17-0x00007FF6A9CC0000-0x00007FF6A9D53000-memory.dmp

          Filesize

          588KB