Resubmissions

18-11-2020 14:18

201118-dj27sn3f52 10

18-11-2020 13:42

201118-1arz86e7w6 10

18-11-2020 13:38

201118-n8jh228ctn 10

Analysis

  • max time kernel
    23s
  • max time network
    61s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 13:38

General

Malware Config

Extracted

Family

formbook

Version

4.0

C2

http://www.worstig.com/w9z/

Decoy

crazzysex.com

hanferd.com

gteesrd.com

bayfrontbabyplace.com

jicuiquan.net

relationshiplink.net

ohchacyberphoto.com

kauegimenes.com

powerful-seldom.com

ketotoken.com

make-money-online-success.com

redgoldcollection.com

hannan-football.com

hamptondc.com

vllii.com

aa8520.com

platform35markethall.com

larozeimmo.com

oligopoly.net

llhak.info

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.com/i0qi/

Decoy

mytakeawaybox.com

goutaihuo.com

kuzey.site

uppertenpiercings.amsterdam

honeygrandpa.com

jenniferabramslaw.com

ncarian.com

heavilymeditatedhouston.com

gsbjyzx.com

akisanblog.com

taoyuanreed.com

jasperrvservices.com

yabbanet.com

myhealthfuldiet.com

flipdigitalcoins.com

toes.photos

shoottillyoumiss.com

maserental.com

smarteacher.net

hamdimagdeco.com

Signatures

  • AgentTesla

    Agent Tesla is a remote access tool (RAT) written in visual basic.

  • CoreEntity .NET Packer 1 IoCs

    A .NET packer called CoreEntity where it has embedded the payload as a BitMap object which is later decrypted.

  • Dharma

    Dharma is a ransomware that uses security software installation to hide malicious activities.

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • AgentTesla Payload 2 IoCs
  • CryptOne packer 2 IoCs

    Detects CryptOne packer defined in NCC blogpost.

  • Formbook Payload 4 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Executes dropped EXE 16 IoCs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 1 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 40 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\1.bin.exe
      "C:\Users\Admin\AppData\Local\Temp\1.bin.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\System32\cmd.exe
        "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\8CC5.tmp\8CD5.tmp\8CD6.bat C:\Users\Admin\AppData\Local\Temp\1.bin.exe"
        3⤵
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe
          "C:\Program Files\Java\jre1.8.0_66\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Roaming\1.jar"
          4⤵
            PID:1380
          • C:\Users\Admin\AppData\Roaming\2.exe
            C:\Users\Admin\AppData\Roaming\2.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of WriteProcessMemory
            PID:696
            • C:\Users\Admin\AppData\Roaming\2.exe
              C:\Users\Admin\AppData\Roaming\2.exe
              5⤵
              • Executes dropped EXE
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:1708
          • C:\Users\Admin\AppData\Roaming\3.exe
            C:\Users\Admin\AppData\Roaming\3.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:3460
          • C:\Users\Admin\AppData\Roaming\4.exe
            C:\Users\Admin\AppData\Roaming\4.exe
            4⤵
            • Executes dropped EXE
            PID:1524
          • C:\Users\Admin\AppData\Roaming\5.exe
            C:\Users\Admin\AppData\Roaming\5.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:3520
          • C:\Users\Admin\AppData\Roaming\6.exe
            C:\Users\Admin\AppData\Roaming\6.exe
            4⤵
            • Executes dropped EXE
            PID:2128
          • C:\Users\Admin\AppData\Roaming\7.exe
            C:\Users\Admin\AppData\Roaming\7.exe
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetWindowsHookEx
            PID:4064
          • C:\Users\Admin\AppData\Roaming\8.exe
            C:\Users\Admin\AppData\Roaming\8.exe
            4⤵
            • Executes dropped EXE
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:4028
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c REG ADD HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run /f /v feeed /t REG_SZ /d C:\Windows\system32\pcalua.exe" -a C:\Users\Admin\AppData\Roaming\feeed.exe"
              5⤵
                PID:4148
            • C:\Users\Admin\AppData\Roaming\9.exe
              C:\Users\Admin\AppData\Roaming\9.exe
              4⤵
              • Executes dropped EXE
              PID:3352
            • C:\Users\Admin\AppData\Roaming\10.exe
              C:\Users\Admin\AppData\Roaming\10.exe
              4⤵
              • Executes dropped EXE
              PID:1520
            • C:\Users\Admin\AppData\Roaming\11.exe
              C:\Users\Admin\AppData\Roaming\11.exe
              4⤵
              • Executes dropped EXE
              • Checks BIOS information in registry
              • Maps connected drives based on registry
              PID:1044
            • C:\Users\Admin\AppData\Roaming\12.exe
              C:\Users\Admin\AppData\Roaming\12.exe
              4⤵
              • Executes dropped EXE
              PID:3764
            • C:\Users\Admin\AppData\Roaming\13.exe
              C:\Users\Admin\AppData\Roaming\13.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1856
            • C:\Users\Admin\AppData\Roaming\14.exe
              C:\Users\Admin\AppData\Roaming\14.exe
              4⤵
              • Executes dropped EXE
              PID:3632
            • C:\Users\Admin\AppData\Roaming\15.exe
              C:\Users\Admin\AppData\Roaming\15.exe
              4⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1240
            • C:\Users\Admin\AppData\Roaming\16.exe
              C:\Users\Admin\AppData\Roaming\16.exe
              4⤵
              • Executes dropped EXE
              • Drops startup file
              • Adds Run key to start application
              • Drops desktop.ini file(s)
              • Drops file in System32 directory
              • Drops file in Program Files directory
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of WriteProcessMemory
              PID:4004
              • C:\Windows\system32\cmd.exe
                "C:\Windows\system32\cmd.exe"
                5⤵
                  PID:4128
              • C:\Users\Admin\AppData\Roaming\17.exe
                C:\Users\Admin\AppData\Roaming\17.exe
                4⤵
                  PID:4332
            • C:\Windows\SysWOW64\explorer.exe
              "C:\Windows\SysWOW64\explorer.exe"
              2⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:3168
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Roaming\2.exe"
                3⤵
                  PID:1516

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1520-93-0x00000000030E3000-0x00000000030E4000-memory.dmp

              Filesize

              4KB

            • memory/1520-94-0x0000000003380000-0x0000000003381000-memory.dmp

              Filesize

              4KB

            • memory/1524-92-0x0000000003730000-0x0000000003731000-memory.dmp

              Filesize

              4KB

            • memory/1708-20-0x0000000000400000-0x000000000042D000-memory.dmp

              Filesize

              180KB

            • memory/2128-42-0x0000000000620000-0x0000000000630000-memory.dmp

              Filesize

              64KB

            • memory/3168-66-0x0000000001330000-0x000000000176F000-memory.dmp

              Filesize

              4.2MB

            • memory/3168-136-0x0000000004B70000-0x0000000004CA7000-memory.dmp

              Filesize

              1.2MB

            • memory/3168-62-0x0000000001330000-0x000000000176F000-memory.dmp

              Filesize

              4.2MB

            • memory/3352-47-0x0000000071110000-0x00000000717FE000-memory.dmp

              Filesize

              6.9MB

            • memory/3352-97-0x0000000005270000-0x0000000005272000-memory.dmp

              Filesize

              8KB

            • memory/3352-63-0x0000000005040000-0x0000000005041000-memory.dmp

              Filesize

              4KB

            • memory/3352-109-0x0000000006D20000-0x0000000006D73000-memory.dmp

              Filesize

              332KB

            • memory/3352-82-0x0000000004FA0000-0x0000000004FA1000-memory.dmp

              Filesize

              4KB

            • memory/3352-56-0x00000000054A0000-0x00000000054A1000-memory.dmp

              Filesize

              4KB

            • memory/3352-48-0x00000000006A0000-0x00000000006A1000-memory.dmp

              Filesize

              4KB

            • memory/3352-111-0x0000000007F70000-0x0000000007F71000-memory.dmp

              Filesize

              4KB

            • memory/3632-132-0x0000000002F13000-0x0000000002F14000-memory.dmp

              Filesize

              4KB

            • memory/3632-135-0x0000000003290000-0x0000000003291000-memory.dmp

              Filesize

              4KB

            • memory/4028-49-0x0000000000820000-0x0000000000821000-memory.dmp

              Filesize

              4KB

            • memory/4028-41-0x0000000071110000-0x00000000717FE000-memory.dmp

              Filesize

              6.9MB

            • memory/4028-108-0x0000000005290000-0x0000000005292000-memory.dmp

              Filesize

              8KB

            • memory/4028-74-0x00000000012F0000-0x00000000012F2000-memory.dmp

              Filesize

              8KB

            • memory/4028-72-0x0000000001140000-0x000000000114F000-memory.dmp

              Filesize

              60KB

            • memory/4028-101-0x0000000005390000-0x0000000005391000-memory.dmp

              Filesize

              4KB

            • memory/4028-91-0x0000000005280000-0x0000000005282000-memory.dmp

              Filesize

              8KB

            • memory/4440-142-0x0000000004E70000-0x0000000004EAA000-memory.dmp

              Filesize

              232KB

            • memory/4440-140-0x0000000004C90000-0x0000000004CDD000-memory.dmp

              Filesize

              308KB

            • memory/4440-131-0x0000000000490000-0x0000000000491000-memory.dmp

              Filesize

              4KB

            • memory/4440-129-0x0000000071110000-0x00000000717FE000-memory.dmp

              Filesize

              6.9MB

            • memory/4968-177-0x0000000001330000-0x000000000176F000-memory.dmp

              Filesize

              4.2MB

            • memory/4968-179-0x0000000001330000-0x000000000176F000-memory.dmp

              Filesize

              4.2MB