Resubmissions

18-11-2020 14:18

201118-dj27sn3f52 10

18-11-2020 13:42

201118-1arz86e7w6 10

18-11-2020 13:38

201118-n8jh228ctn 10

Analysis

  • max time kernel
    23s
  • max time network
    61s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 13:38

General

Malware Config

Extracted

Family

formbook

Version

4.0

C2

http://www.worstig.com/w9z/

Decoy

crazzysex.com

hanferd.com

gteesrd.com

bayfrontbabyplace.com

jicuiquan.net

relationshiplink.net

ohchacyberphoto.com

kauegimenes.com

powerful-seldom.com

ketotoken.com

make-money-online-success.com

redgoldcollection.com

hannan-football.com

hamptondc.com

vllii.com

aa8520.com

platform35markethall.com

larozeimmo.com

oligopoly.net

llhak.info

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.com/i0qi/

Decoy

mytakeawaybox.com

goutaihuo.com

kuzey.site

uppertenpiercings.amsterdam

honeygrandpa.com

jenniferabramslaw.com

ncarian.com

heavilymeditatedhouston.com

gsbjyzx.com

akisanblog.com

taoyuanreed.com

jasperrvservices.com

yabbanet.com

myhealthfuldiet.com

flipdigitalcoins.com

toes.photos

shoottillyoumiss.com

maserental.com

smarteacher.net

hamdimagdeco.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • AgentTesla Payload 2 IoCs
  • CryptOne packer 2 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Formbook Payload 4 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Executes dropped EXE 16 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\1.bin.exe
      "C:\Users\Admin\AppData\Local\Temp\1.bin.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\System32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8CC5.tmp\8CD5.tmp\8CD6.bat C:\Users\Admin\AppData\Local\Temp\1.bin.exe"
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
          "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"
          4⤵
            PID:1380
          • C:\Users\Admin\AppData\Roaming\2.exe
            C:\Users\Admin\AppData\Roaming\2.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:696
            • C:\Users\Admin\AppData\Roaming\2.exe
              C:\Users\Admin\AppData\Roaming\2.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1708
          • C:\Users\Admin\AppData\Roaming\3.exe
            C:\Users\Admin\AppData\Roaming\3.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3460
          • C:\Users\Admin\AppData\Roaming\4.exe
            C:\Users\Admin\AppData\Roaming\4.exe
            4⤵
            • Executes dropped EXE
            PID:1524
          • C:\Users\Admin\AppData\Roaming\5.exe
            C:\Users\Admin\AppData\Roaming\5.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3520
          • C:\Users\Admin\AppData\Roaming\6.exe
            C:\Users\Admin\AppData\Roaming\6.exe
            4⤵
            • Executes dropped EXE
            PID:2128
          • C:\Users\Admin\AppData\Roaming\7.exe
            C:\Users\Admin\AppData\Roaming\7.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4064
          • C:\Users\Admin\AppData\Roaming\8.exe
            C:\Users\Admin\AppData\Roaming\8.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4028
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"
              5⤵
                PID:4148
            • C:\Users\Admin\AppData\Roaming\9.exe
              C:\Users\Admin\AppData\Roaming\9.exe
              4⤵
              • Executes dropped EXE
              PID:3352
            • C:\Users\Admin\AppData\Roaming\10.exe
              C:\Users\Admin\AppData\Roaming\10.exe
              4⤵
              • Executes dropped EXE
              PID:1520
            • C:\Users\Admin\AppData\Roaming\11.exe
              C:\Users\Admin\AppData\Roaming\11.exe
              4⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Maps connected drives based on registry
              PID:1044
            • C:\Users\Admin\AppData\Roaming\12.exe
              C:\Users\Admin\AppData\Roaming\12.exe
              4⤵
              • Executes dropped EXE
              PID:3764
            • C:\Users\Admin\AppData\Roaming\13.exe
              C:\Users\Admin\AppData\Roaming\13.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1856
            • C:\Users\Admin\AppData\Roaming\14.exe
              C:\Users\Admin\AppData\Roaming\14.exe
              4⤵
              • Executes dropped EXE
              PID:3632
            • C:\Users\Admin\AppData\Roaming\15.exe
              C:\Users\Admin\AppData\Roaming\15.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1240
            • C:\Users\Admin\AppData\Roaming\16.exe
              C:\Users\Admin\AppData\Roaming\16.exe
              4⤵
              • Executes dropped EXE
              • Drops startup file
              • Adds Run key to start application
              • Drops desktop.ini file(s)
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4004
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe"
                5⤵
                  PID:4128
              • C:\Users\Admin\AppData\Roaming\17.exe
                C:\Users\Admin\AppData\Roaming\17.exe
                4⤵
                  PID:4332
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3168
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Roaming\2.exe"
                3⤵
                  PID:1516

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Virtualization/Sandbox Evasion

            2
            T1497

            Modify Registry

            1
            T1112

            Discovery

            Query Registry

            4
            T1012

            Virtualization/Sandbox Evasion

            2
            T1497

            System Information Discovery

            3
            T1082

            Peripheral Device Discovery

            1
            T1120

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\8CC5.tmp\8CD5.tmp\8CD6.bat
            • C:\Users\Admin\AppData\Roaming\1.jar
            • C:\Users\Admin\AppData\Roaming\10.exe
            • C:\Users\Admin\AppData\Roaming\10.exe
            • C:\Users\Admin\AppData\Roaming\11.exe
            • C:\Users\Admin\AppData\Roaming\11.exe
            • C:\Users\Admin\AppData\Roaming\12.exe
            • C:\Users\Admin\AppData\Roaming\12.exe
            • C:\Users\Admin\AppData\Roaming\13.exe
            • C:\Users\Admin\AppData\Roaming\13.exe
            • C:\Users\Admin\AppData\Roaming\13.exe
            • C:\Users\Admin\AppData\Roaming\14.exe
            • C:\Users\Admin\AppData\Roaming\14.exe
            • C:\Users\Admin\AppData\Roaming\15.exe
            • C:\Users\Admin\AppData\Roaming\15.exe
            • C:\Users\Admin\AppData\Roaming\16.exe
            • C:\Users\Admin\AppData\Roaming\16.exe
            • C:\Users\Admin\AppData\Roaming\17.exe
            • C:\Users\Admin\AppData\Roaming\17.exe
            • C:\Users\Admin\AppData\Roaming\18.exe
            • C:\Users\Admin\AppData\Roaming\18.exe
            • C:\Users\Admin\AppData\Roaming\19.exe
            • C:\Users\Admin\AppData\Roaming\19.exe
            • C:\Users\Admin\AppData\Roaming\2.exe
            • C:\Users\Admin\AppData\Roaming\2.exe
            • C:\Users\Admin\AppData\Roaming\2.exe
            • C:\Users\Admin\AppData\Roaming\20.exe
            • C:\Users\Admin\AppData\Roaming\20.exe
            • C:\Users\Admin\AppData\Roaming\21.exe
            • C:\Users\Admin\AppData\Roaming\21.exe
            • C:\Users\Admin\AppData\Roaming\3.exe
            • C:\Users\Admin\AppData\Roaming\3.exe
            • C:\Users\Admin\AppData\Roaming\3.exe
            • C:\Users\Admin\AppData\Roaming\4.exe
            • C:\Users\Admin\AppData\Roaming\4.exe
            • C:\Users\Admin\AppData\Roaming\5.exe
            • C:\Users\Admin\AppData\Roaming\5.exe
            • C:\Users\Admin\AppData\Roaming\6.exe
              MD5

              cf04c482d91c7174616fb8e83288065a

              SHA1

              6444eb10ec9092826d712c1efad73e74c2adae14

              SHA256

              7b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf

              SHA512

              3eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6

            • C:\Users\Admin\AppData\Roaming\6.exe
              MD5

              cf04c482d91c7174616fb8e83288065a

              SHA1

              6444eb10ec9092826d712c1efad73e74c2adae14

              SHA256

              7b01d36ac9a77abfa6a0ddbf27d630effae555aac9ae75b051c6eedaf18d1dcf

              SHA512

              3eca1e17e698c427bc916465526f61caee356d7586836b022f573c33a6533ce4b4b0f3fbd05cc2b7b44568e814121854fdf82480757f02d925e293f7d92a2af6

            • C:\Users\Admin\AppData\Roaming\7.exe
            • C:\Users\Admin\AppData\Roaming\7.exe
            • C:\Users\Admin\AppData\Roaming\8.exe
              MD5

              dea5598aaf3e9dcc3073ba73d972ab17

              SHA1

              51da8356e81c5acff3c876dffbf52195fe87d97f

              SHA256

              8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

              SHA512

              a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

            • C:\Users\Admin\AppData\Roaming\8.exe
              MD5

              dea5598aaf3e9dcc3073ba73d972ab17

              SHA1

              51da8356e81c5acff3c876dffbf52195fe87d97f

              SHA256

              8ec9516ac0a765c28adfe04c132619170e986df07b1ea541426be124fb7cfd2c

              SHA512

              a6c674ba3d510120a1d163be7e7638f616eedb15af5653b0952e63b7fd4c2672fafc9638ab7795e76b7f07d995196437d6c35e5b8814e9ad866ea903f620e81e

            • C:\Users\Admin\AppData\Roaming\9.exe
            • C:\Users\Admin\AppData\Roaming\9.exe
            • memory/696-6-0x0000000000000000-mapping.dmp
            • memory/696-4-0x0000000000000000-mapping.dmp
            • memory/1044-57-0x0000000000000000-mapping.dmp
            • memory/1044-58-0x0000000000000000-mapping.dmp
            • memory/1240-98-0x0000000000000000-mapping.dmp
            • memory/1240-96-0x0000000000000000-mapping.dmp
            • memory/1380-3-0x0000000000000000-mapping.dmp
            • memory/1516-86-0x0000000000000000-mapping.dmp
            • memory/1520-51-0x0000000000000000-mapping.dmp
            • memory/1520-93-0x00000000030E3000-0x00000000030E4000-memory.dmp
              Filesize

              4KB

            • memory/1520-94-0x0000000003380000-0x0000000003381000-memory.dmp
              Filesize

              4KB

            • memory/1520-52-0x0000000000000000-mapping.dmp
            • memory/1524-92-0x0000000003730000-0x0000000003731000-memory.dmp
              Filesize

              4KB

            • memory/1524-12-0x0000000000000000-mapping.dmp
            • memory/1524-13-0x0000000000000000-mapping.dmp
            • memory/1708-20-0x0000000000400000-0x000000000042D000-memory.dmp
              Filesize

              180KB

            • memory/1708-22-0x000000000041E2D0-mapping.dmp
            • memory/1856-76-0x0000000000000000-mapping.dmp
            • memory/1856-77-0x0000000000000000-mapping.dmp
            • memory/2128-42-0x0000000000620000-0x0000000000630000-memory.dmp
              Filesize

              64KB

            • memory/2128-21-0x0000000000000000-mapping.dmp
            • memory/2128-19-0x0000000000000000-mapping.dmp
            • memory/2684-0-0x0000000000000000-mapping.dmp
            • memory/3168-66-0x0000000001330000-0x000000000176F000-memory.dmp
              Filesize

              4.2MB

            • memory/3168-136-0x0000000004B70000-0x0000000004CA7000-memory.dmp
              Filesize

              1.2MB

            • memory/3168-59-0x0000000000000000-mapping.dmp
            • memory/3168-62-0x0000000001330000-0x000000000176F000-memory.dmp
              Filesize

              4.2MB

            • memory/3352-47-0x0000000071110000-0x00000000717FE000-memory.dmp
              Filesize

              6.9MB

            • memory/3352-97-0x0000000005270000-0x0000000005272000-memory.dmp
              Filesize

              8KB

            • memory/3352-63-0x0000000005040000-0x0000000005041000-memory.dmp
              Filesize

              4KB

            • memory/3352-109-0x0000000006D20000-0x0000000006D73000-memory.dmp
              Filesize

              332KB

            • memory/3352-82-0x0000000004FA0000-0x0000000004FA1000-memory.dmp
              Filesize

              4KB

            • memory/3352-56-0x00000000054A0000-0x00000000054A1000-memory.dmp
              Filesize

              4KB

            • memory/3352-44-0x0000000000000000-mapping.dmp
            • memory/3352-48-0x00000000006A0000-0x00000000006A1000-memory.dmp
              Filesize

              4KB

            • memory/3352-43-0x0000000000000000-mapping.dmp
            • memory/3352-111-0x0000000007F70000-0x0000000007F71000-memory.dmp
              Filesize

              4KB

            • memory/3460-8-0x0000000000000000-mapping.dmp
            • memory/3460-9-0x0000000000000000-mapping.dmp
            • memory/3520-15-0x0000000000000000-mapping.dmp
            • memory/3520-16-0x0000000000000000-mapping.dmp
            • memory/3632-85-0x0000000000000000-mapping.dmp
            • memory/3632-132-0x0000000002F13000-0x0000000002F14000-memory.dmp
              Filesize

              4KB

            • memory/3632-135-0x0000000003290000-0x0000000003291000-memory.dmp
              Filesize

              4KB

            • memory/3632-87-0x0000000000000000-mapping.dmp
            • memory/3764-69-0x0000000000000000-mapping.dmp
            • memory/3764-67-0x0000000000000000-mapping.dmp
            • memory/4004-104-0x0000000000000000-mapping.dmp
            • memory/4004-105-0x0000000000000000-mapping.dmp
            • memory/4028-49-0x0000000000820000-0x0000000000821000-memory.dmp
              Filesize

              4KB

            • memory/4028-41-0x0000000071110000-0x00000000717FE000-memory.dmp
              Filesize

              6.9MB

            • memory/4028-108-0x0000000005290000-0x0000000005292000-memory.dmp
              Filesize

              8KB

            • memory/4028-38-0x0000000000000000-mapping.dmp
            • memory/4028-74-0x00000000012F0000-0x00000000012F2000-memory.dmp
              Filesize

              8KB

            • memory/4028-37-0x0000000000000000-mapping.dmp
            • memory/4028-72-0x0000000001140000-0x000000000114F000-memory.dmp
              Filesize

              60KB

            • memory/4028-101-0x0000000005390000-0x0000000005391000-memory.dmp
              Filesize

              4KB

            • memory/4028-91-0x0000000005280000-0x0000000005282000-memory.dmp
              Filesize

              8KB

            • memory/4064-31-0x0000000000000000-mapping.dmp
            • memory/4064-30-0x0000000000000000-mapping.dmp
            • memory/4128-110-0x0000000000000000-mapping.dmp
            • memory/4148-113-0x0000000000000000-mapping.dmp
            • memory/4332-114-0x0000000000000000-mapping.dmp
            • memory/4332-115-0x0000000000000000-mapping.dmp
            • memory/4376-119-0x00000000004015B0-mapping.dmp
            • memory/4440-142-0x0000000004E70000-0x0000000004EAA000-memory.dmp
              Filesize

              232KB

            • memory/4440-126-0x0000000000000000-mapping.dmp
            • memory/4440-140-0x0000000004C90000-0x0000000004CDD000-memory.dmp
              Filesize

              308KB

            • memory/4440-131-0x0000000000490000-0x0000000000491000-memory.dmp
              Filesize

              4KB

            • memory/4440-129-0x0000000071110000-0x00000000717FE000-memory.dmp
              Filesize

              6.9MB

            • memory/4440-125-0x0000000000000000-mapping.dmp
            • memory/4560-137-0x0000000000000000-mapping.dmp
            • memory/4576-141-0x0000000000000000-mapping.dmp
            • memory/4576-138-0x0000000000000000-mapping.dmp
            • memory/4660-149-0x0000000000000000-mapping.dmp
            • memory/4748-154-0x0000000000000000-mapping.dmp
            • memory/4748-155-0x0000000000000000-mapping.dmp
            • memory/4828-163-0x00000000004015B4-mapping.dmp
            • memory/4892-167-0x0000000000000000-mapping.dmp
            • memory/4892-166-0x0000000000000000-mapping.dmp
            • memory/4932-171-0x0000000000000000-mapping.dmp
            • memory/4968-175-0x0000000000000000-mapping.dmp
            • memory/4968-177-0x0000000001330000-0x000000000176F000-memory.dmp
              Filesize

              4.2MB

            • memory/4968-179-0x0000000001330000-0x000000000176F000-memory.dmp
              Filesize

              4.2MB

            • memory/5068-178-0x0000000000000000-mapping.dmp