Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    11-12-2020 19:04

General

  • Target

    SMT20200616.exe

  • Size

    311KB

  • MD5

    9eda8430e6bf0bab3f1e7134b584cd1b

  • SHA1

    03b3d3d673686f0bd4316bd99c0a135e6e3250ba

  • SHA256

    1c22bad3a6eb408ec1f4d6ef50b04e2294a77979abc411f9dbb752e2b495345b

  • SHA512

    6ad03fb677542c246814976b473d033c743d0cee598139f96cd91e1c0fb958bc0dba5ad712b9fc61c72df09fcdf1b762ef0ae77f5692d6b7f1252935eb40cf78

Malware Config

Extracted

Family

formbook

C2

http://www.sudelt.com/rk3/

Decoy

cedarridgerussellterriers.com

zamperl-couture.com

8minutesprofitlink.com

yuyinyue.net

castleminerforum.com

habbodm.biz

tektlc.life

strive2thriveglobal.com

richen8.com

ettlingen.digital

clairegoals.com

clearptsd.biz

wxqingtai.com

matttoken.com

macopride.com

hudong.ltd

wirelessantalya.com

connectlibrary.com

ourtime.site

vitalitymax.life

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • rezer0 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3040
    • C:\Users\Admin\AppData\Local\Temp\SMT20200616.exe
      "C:\Users\Admin\AppData\Local\Temp\SMT20200616.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:580
      • C:\Users\Admin\AppData\Local\Temp\SMT20200616.exe
        "{path}"
        3⤵
          PID:2624
        • C:\Users\Admin\AppData\Local\Temp\SMT20200616.exe
          "{path}"
          3⤵
            PID:2724
          • C:\Users\Admin\AppData\Local\Temp\SMT20200616.exe
            "{path}"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:4008
        • C:\Windows\SysWOW64\chkdsk.exe
          "C:\Windows\SysWOW64\chkdsk.exe"
          2⤵
          • Adds policy Run key to start application
          • Suspicious use of SetThreadContext
          • Drops file in Program Files directory
          • Enumerates system info in registry
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1528
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\SMT20200616.exe"
            3⤵
              PID:2124
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              3⤵
                PID:2344

          Network

          MITRE ATT&CK Matrix ATT&CK v6

          Persistence

          Registry Run Keys / Startup Folder

          1
          T1060

          Defense Evasion

          Modify Registry

          2
          T1112

          Credential Access

          Credentials in Files

          1
          T1081

          Discovery

          Query Registry

          1
          T1012

          System Information Discovery

          1
          T1082

          Collection

          Data from Local System

          1
          T1005

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/580-2-0x0000000073190000-0x000000007387E000-memory.dmp
            Filesize

            6.9MB

          • memory/580-3-0x0000000000D50000-0x0000000000D51000-memory.dmp
            Filesize

            4KB

          • memory/580-5-0x0000000005700000-0x0000000005701000-memory.dmp
            Filesize

            4KB

          • memory/580-6-0x00000000030D0000-0x00000000030DB000-memory.dmp
            Filesize

            44KB

          • memory/580-7-0x0000000005840000-0x0000000005841000-memory.dmp
            Filesize

            4KB

          • memory/580-8-0x0000000005C70000-0x0000000005CA4000-memory.dmp
            Filesize

            208KB

          • memory/580-9-0x00000000062E0000-0x00000000062E1000-memory.dmp
            Filesize

            4KB

          • memory/1528-17-0x00000000080F0000-0x0000000008232000-memory.dmp
            Filesize

            1.3MB

          • memory/1528-16-0x0000000005D40000-0x0000000005E0C000-memory.dmp
            Filesize

            816KB

          • memory/1528-12-0x0000000000000000-mapping.dmp
          • memory/1528-13-0x0000000000040000-0x000000000004A000-memory.dmp
            Filesize

            40KB

          • memory/1528-14-0x0000000000040000-0x000000000004A000-memory.dmp
            Filesize

            40KB

          • memory/2124-15-0x0000000000000000-mapping.dmp
          • memory/2344-18-0x0000000000000000-mapping.dmp
          • memory/2344-19-0x00007FF615870000-0x00007FF615903000-memory.dmp
            Filesize

            588KB

          • memory/2344-20-0x00007FF615870000-0x00007FF615903000-memory.dmp
            Filesize

            588KB

          • memory/2344-21-0x00007FF615870000-0x00007FF615903000-memory.dmp
            Filesize

            588KB

          • memory/4008-10-0x0000000000400000-0x000000000042D000-memory.dmp
            Filesize

            180KB

          • memory/4008-11-0x000000000041E300-mapping.dmp