Analysis

  • max time kernel
    123s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-12-2020 10:35

General

  • Target

    90508db9aa3b3698eb08109217eb43b7.exe

  • Size

    1.0MB

  • MD5

    90508db9aa3b3698eb08109217eb43b7

  • SHA1

    f443522186cad995be2fce64a377bb1e01b49250

  • SHA256

    b28f4495e2cda5a5fef0408701a136d820c7cf2e7a45dd101e70b31458e31530

  • SHA512

    34f683a79d9bcef09a77dd2edf85015b540fd55cb2c709daa7363fa70518f30a6c99d48de7424ef551b8b13ce96dc6a472c319f1eddec2b4acaf2d0d8fb2f4aa

Malware Config

Extracted

Family

formbook

C2

http://www.switchtoambitwithmirtha.com/jskg/

Decoy

jajaten.com

pnorg.net

rccarquibogota.com

marcomarabiamea.com

theligue.com

mdearpet.com

barokahsrivillage.com

wisdomtoothguru.com

srteamsex.com

erotictoybox.com

278698.com

victimaccidents.com

bootyfashions.com

stomasto.site

canalysisconsulting.com

printandmail.legal

bestcureforbackpain.com

apanifitness.com

smartabletech.com

facialsteamerofficial.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\90508db9aa3b3698eb08109217eb43b7.exe
    "C:\Users\Admin\AppData\Local\Temp\90508db9aa3b3698eb08109217eb43b7.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:800
    • C:\Users\Admin\AppData\Local\Temp\90508db9aa3b3698eb08109217eb43b7.exe
      "C:\Users\Admin\AppData\Local\Temp\90508db9aa3b3698eb08109217eb43b7.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:992

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/336-4-0x000007FEF7C70000-0x000007FEF7EEA000-memory.dmp
    Filesize

    2.5MB

  • memory/800-2-0x0000000001D40000-0x0000000001DA5000-memory.dmp
    Filesize

    404KB

  • memory/800-5-0x00000000043B0000-0x00000000043FC000-memory.dmp
    Filesize

    304KB

  • memory/992-7-0x0000000000530000-0x000000000055B000-memory.dmp
    Filesize

    172KB

  • memory/992-8-0x000000000053164C-mapping.dmp
  • memory/992-9-0x0000000000530000-0x000000000055B000-memory.dmp
    Filesize

    172KB