Analysis

  • max time kernel
    20s
  • max time network
    165s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    18-11-2020 16:58

General

Malware Config

Extracted

Family

formbook

Version

4.0

C2

http://www.worstig.com/w9z/

Decoy

crazzysex.com

hanferd.com

gteesrd.com

bayfrontbabyplace.com

jicuiquan.net

relationshiplink.net

ohchacyberphoto.com

kauegimenes.com

powerful-seldom.com

ketotoken.com

make-money-online-success.com

redgoldcollection.com

hannan-football.com

hamptondc.com

vllii.com

aa8520.com

platform35markethall.com

larozeimmo.com

oligopoly.net

llhak.info

Extracted

Family

gozi_rm3

Attributes
  • exe_type

    loader

Extracted

Family

gozi_rm3

Botnet

86920224

C2

https://sibelikinciel.xyz

Attributes
  • build

    300869

  • exe_type

    loader

  • server_id

    12

  • url_path

    index.htm

rsa_pubkey.plain
serpent.plain

Extracted

Family

danabot

C2

92.204.160.54

2.56.213.179

45.153.186.47

93.115.21.29

185.45.193.50

193.34.166.247

rsa_pubkey.plain

Extracted

Family

formbook

Version

4.1

C2

http://www.norjax.com/app/

Decoy

niresandcard.com

bonusscommesseonline.com

mezhyhirya.com

paklfz.com

bespokewomensuits.com

smarteralarm.info

munespansiyon.com

pmtradehouse.com

hotmobile-uk.com

ntdao.com

zohariaz.com

www145123.com

oceanstateofstyle.com

palermofelicissima.info

yourkinas.com

pthwheel.net

vfmagent.com

xn--3v0bw66b.com

comsystematrisk.win

on9.party

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Danabot

    Danabot is a modular banking Trojan that has been linked with other malware.

  • Danabot x86 payload 6 IoCs

    Detection of Danabot x86 payload, mapped in memory during the execution of its loader.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Gozi RM3

    A heavily modified version of Gozi using RM3 loader.

  • AgentTesla Payload 15 IoCs
  • CryptOne packer 2 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Formbook Payload 8 IoCs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Executes dropped EXE 12 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: CmdExeWriteProcessMemorySpam 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\31.exe
      "C:\Users\Admin\AppData\Local\Temp\31.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Windows\system32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8B3F.tmp\8B40.tmp\8B41.bat C:\Users\Admin\AppData\Local\Temp\31.exe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1948
        • C:\Program Files\Java\jre7\bin\javaw.exe
          "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"
          4⤵
            PID:1444
          • C:\Users\Admin\AppData\Roaming\2.exe
            C:\Users\Admin\AppData\Roaming\2.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:1020
            • C:\Users\Admin\AppData\Roaming\2.exe
              C:\Users\Admin\AppData\Roaming\2.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:568
          • C:\Users\Admin\AppData\Roaming\3.exe
            C:\Users\Admin\AppData\Roaming\3.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of SetWindowsHookEx
            PID:1664
          • C:\Users\Admin\AppData\Roaming\4.exe
            C:\Users\Admin\AppData\Roaming\4.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:668
          • C:\Users\Admin\AppData\Roaming\5.exe
            C:\Users\Admin\AppData\Roaming\5.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1460
          • C:\Users\Admin\AppData\Roaming\6.exe
            C:\Users\Admin\AppData\Roaming\6.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:908
          • C:\Users\Admin\AppData\Roaming\7.exe
            C:\Users\Admin\AppData\Roaming\7.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious use of SetWindowsHookEx
            PID:428
          • C:\Users\Admin\AppData\Roaming\8.exe
            C:\Users\Admin\AppData\Roaming\8.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:812
          • C:\Users\Admin\AppData\Roaming\9.exe
            C:\Users\Admin\AppData\Roaming\9.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1164
          • C:\Users\Admin\AppData\Roaming\10.exe
            C:\Users\Admin\AppData\Roaming\10.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:476
          • C:\Users\Admin\AppData\Roaming\11.exe
            C:\Users\Admin\AppData\Roaming\11.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1600
          • C:\Users\Admin\AppData\Roaming\12.exe
            C:\Users\Admin\AppData\Roaming\12.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            PID:1720
      • C:\Windows\SysWOW64\help.exe
        "C:\Windows\SysWOW64\help.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:340
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Roaming\2.exe"
          3⤵
            PID:1668

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/340-66-0x0000000001840000-0x00000000019CD000-memory.dmp

        Filesize

        1.6MB

      • memory/340-116-0x0000000002F60000-0x0000000003035000-memory.dmp

        Filesize

        852KB

      • memory/340-152-0x00000000031B0000-0x000000000331E000-memory.dmp

        Filesize

        1.4MB

      • memory/340-127-0x0000000002F60000-0x0000000003035000-memory.dmp

        Filesize

        852KB

      • memory/340-58-0x0000000000950000-0x0000000000956000-memory.dmp

        Filesize

        24KB

      • memory/476-63-0x0000000002F0A000-0x0000000002F0B000-memory.dmp

        Filesize

        4KB

      • memory/476-64-0x00000000031A0000-0x00000000031B1000-memory.dmp

        Filesize

        68KB

      • memory/568-15-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/668-60-0x0000000003220000-0x0000000003497000-memory.dmp

        Filesize

        2.5MB

      • memory/668-65-0x00000000034A0000-0x00000000034B1000-memory.dmp

        Filesize

        68KB

      • memory/812-113-0x0000000000930000-0x0000000000932000-memory.dmp

        Filesize

        8KB

      • memory/812-82-0x0000000000DE0000-0x0000000000DE1000-memory.dmp

        Filesize

        4KB

      • memory/812-61-0x0000000072E90000-0x000000007357E000-memory.dmp

        Filesize

        6.9MB

      • memory/812-109-0x0000000000750000-0x000000000075F000-memory.dmp

        Filesize

        60KB

      • memory/812-114-0x0000000000A40000-0x0000000000A42000-memory.dmp

        Filesize

        8KB

      • memory/812-111-0x0000000000760000-0x0000000000762000-memory.dmp

        Filesize

        8KB

      • memory/908-56-0x0000000000280000-0x0000000000290000-memory.dmp

        Filesize

        64KB

      • memory/1164-110-0x0000000004CF0000-0x0000000004D43000-memory.dmp

        Filesize

        332KB

      • memory/1164-108-0x0000000000670000-0x0000000000672000-memory.dmp

        Filesize

        8KB

      • memory/1164-81-0x0000000000F70000-0x0000000000F71000-memory.dmp

        Filesize

        4KB

      • memory/1164-62-0x0000000072E90000-0x000000007357E000-memory.dmp

        Filesize

        6.9MB

      • memory/2188-169-0x0000000072E90000-0x000000007357E000-memory.dmp

        Filesize

        6.9MB

      • memory/2188-168-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2188-159-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2188-167-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2256-112-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp

        Filesize

        2.5MB

      • memory/2428-175-0x0000000006FF0000-0x0000000007013000-memory.dmp

        Filesize

        140KB

      • memory/2428-158-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

        Filesize

        4KB

      • memory/2428-174-0x0000000002EE0000-0x0000000002EE1000-memory.dmp

        Filesize

        4KB

      • memory/2452-121-0x0000000000400000-0x000000000042D000-memory.dmp

        Filesize

        180KB

      • memory/2508-157-0x0000000076B50000-0x0000000076C6D000-memory.dmp

        Filesize

        1.1MB

      • memory/2508-156-0x0000000076990000-0x000000007699C000-memory.dmp

        Filesize

        48KB

      • memory/2508-125-0x0000000000300000-0x0000000000318000-memory.dmp

        Filesize

        96KB

      • memory/2508-129-0x0000000001E20000-0x0000000001ECD000-memory.dmp

        Filesize

        692KB

      • memory/2668-173-0x000000013FA20000-0x000000013FAB3000-memory.dmp

        Filesize

        588KB

      • memory/2896-139-0x0000000072E90000-0x000000007357E000-memory.dmp

        Filesize

        6.9MB

      • memory/2896-138-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2896-137-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2896-134-0x0000000000400000-0x0000000000452000-memory.dmp

        Filesize

        328KB

      • memory/2948-146-0x0000000000020000-0x0000000000021000-memory.dmp

        Filesize

        4KB

      • memory/2948-144-0x0000000072E90000-0x000000007357E000-memory.dmp

        Filesize

        6.9MB