Analysis

  • max time kernel
    145s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    22-12-2020 08:20

General

  • Target

    Payment Order Inv.exe

  • Size

    770KB

  • MD5

    66a395765d579f24cf42766d37072416

  • SHA1

    e1884c073f2a3c11decba1f914e0ca4d3dc0eb11

  • SHA256

    5b59e08e82994cd78df8856c5d7cfd4b30be947a9f7329af1a13d47652b189fc

  • SHA512

    2fdf5f7f709ba0b77ba7b9707a8f532e1e5019087c1617b6eeaf362d466a40b7d47672d80a61e0a6c8e249c4ddc1f25d697ba51fd8c33d94cc83c11a020dd3e1

Malware Config

Extracted

Family

formbook

C2

http://www.plantbasedtransporter.com/m98/

Decoy

anesbensghair.com

crewsquid.com

thetekapp.com

africaisin.com

dodailyworkout.com

al-sultangate.com

aliciafowens.com

bbluebelt3dwdbuy.com

qjpay.pro

emotionalgun.club

guapasnatural.com

myessentials2020.com

cw-mag.com

petrousd.com

byyter.com

hima-tubusi.com

chapelcouture.com

thehollowcause.site

moskovganteng.com

2024project.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Formbook Payload 3 IoCs
  • ModiLoader First Stage 1 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1236
    • C:\Users\Admin\AppData\Local\Temp\Payment Order Inv.exe
      "C:\Users\Admin\AppData\Local\Temp\Payment Order Inv.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1084
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1636
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:748

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    4
    T1112

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/428-6-0x0000000000000000-mapping.dmp
    • memory/428-7-0x0000000000220000-0x0000000000225000-memory.dmp
      Filesize

      20KB

    • memory/428-8-0x0000000003740000-0x0000000003889000-memory.dmp
      Filesize

      1.3MB

    • memory/428-9-0x0000000003920000-0x0000000003A66000-memory.dmp
      Filesize

      1.3MB

    • memory/568-3-0x000007FEF7800000-0x000007FEF7A7A000-memory.dmp
      Filesize

      2.5MB

    • memory/748-10-0x0000000000000000-mapping.dmp
    • memory/748-11-0x000000013F590000-0x000000013F623000-memory.dmp
      Filesize

      588KB

    • memory/1084-2-0x00000000002B0000-0x00000000002CA000-memory.dmp
      Filesize

      104KB

    • memory/1636-4-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1636-5-0x000000000041EB30-mapping.dmp