Analysis

  • max time kernel
    145s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    31-07-2020 09:25

General

  • Target

    Confirmation voucher.exe

  • Size

    1.1MB

  • MD5

    7c239ebd95edce558af5ab4ba444a20e

  • SHA1

    72b95da770016af3be66101db42c191d60685d7f

  • SHA256

    0cd1ca47d2e04de65562e1ba4d8ce4545ee486999f8f0eb7adc880c7fb7fc9b8

  • SHA512

    bf4ad36a62ef6583dc82674767fcadffa23d5667d664e08c36cc3e05a3368ac269463dfd446be5f00db07e2918c8705190398a97a4b538ab4c61705262d5542d

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Drops file in Program Files directory 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Formbook Payload 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\Confirmation voucher.exe
      "C:\Users\Admin\AppData\Local\Temp\Confirmation voucher.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Roaming\52828230\okxjgnm.pif
        "C:\Users\Admin\AppData\Roaming\52828230\okxjgnm.pif" xllpdbhw.ifs
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        • Suspicious use of SetThreadContext
        PID:1692
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          PID:552
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
          "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          PID:628
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious behavior: MapViewOfSection
      • Drops file in Program Files directory
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Modifies Internet Explorer settings
      PID:860
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe"
        3⤵
          PID:472
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:3904
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:3828

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DB1
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
        • C:\Users\Admin\AppData\Local\Temp\RegSvcs.exe
        • C:\Users\Admin\AppData\Roaming\52828230\bbdkgohw.ico
        • C:\Users\Admin\AppData\Roaming\52828230\okxjgnm.pif
        • C:\Users\Admin\AppData\Roaming\52828230\okxjgnm.pif
        • C:\Users\Admin\AppData\Roaming\52828230\xllpdbhw.ifs
        • memory/472-14-0x0000000000000000-mapping.dmp
        • memory/628-5-0x0000000000400000-0x000000000042D000-memory.dmp
          Filesize

          180KB

        • memory/628-6-0x000000000041E300-mapping.dmp
        • memory/860-11-0x0000000000000000-mapping.dmp
        • memory/860-13-0x00000000003F0000-0x0000000000406000-memory.dmp
          Filesize

          88KB

        • memory/860-12-0x00000000003F0000-0x0000000000406000-memory.dmp
          Filesize

          88KB

        • memory/860-15-0x00000000055E0000-0x00000000056D3000-memory.dmp
          Filesize

          972KB

        • memory/860-18-0x0000000003230000-0x000000000330A000-memory.dmp
          Filesize

          872KB

        • memory/1692-0-0x0000000000000000-mapping.dmp
        • memory/3828-19-0x0000000000000000-mapping.dmp
        • memory/3828-21-0x00007FF78E720000-0x00007FF78E7B3000-memory.dmp
          Filesize

          588KB

        • memory/3828-20-0x00007FF78E720000-0x00007FF78E7B3000-memory.dmp
          Filesize

          588KB

        • memory/3828-22-0x00007FF78E720000-0x00007FF78E7B3000-memory.dmp
          Filesize

          588KB

        • memory/3904-16-0x0000000000000000-mapping.dmp