Analysis

  • max time kernel
    146s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12-01-2021 07:27

General

  • Target

    order no. 43453.exe

  • Size

    888KB

  • MD5

    6ec0ad707cfd679db91e380648658a1c

  • SHA1

    6522654f789b6da6045c244187c776401ae61b35

  • SHA256

    b9e89d7766f894c102cd449dace5e9c1ef8f3cdca070af5f6ce22a7737eb593a

  • SHA512

    0255a358f7307400f4511d0cf6ef848291bdce447a2aff3dae239664cc80b4c3c74ccf674a0da0f7c64ef395181da07e46ed0b146574d5c9232e4c8e36c6aeb7

Malware Config

Extracted

Family

formbook

C2

http://www.valiantbranch.com/0wdn/

Decoy

inclusivefamilybookshop.com

hollyjmillsphotography.com

mojavewellnessaz.com

cookies-x.info

trainingkanban.com

tempoborough.life

mayalv.com

mbsgiftstore.com

vanjele.com

serieshaha.com

jlbstructural.com

topkids.asia

thejoyofleather.com

qvujxa.com

anythinginworld.com

danielablason.com

smartphoneloops.com

thisisauckland.com

cityelectricals.com

revati-thenoir.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1196
      • C:\Users\Admin\AppData\Local\Temp\order no. 43453.exe
        "C:\Users\Admin\AppData\Local\Temp\order no. 43453.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1036
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ZlxSqEyhCzs" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2E03.tmp"
          3⤵
          • Creates scheduled task(s)
          PID:584
        • C:\Users\Admin\AppData\Local\Temp\order no. 43453.exe
          "C:\Users\Admin\AppData\Local\Temp\order no. 43453.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1484
          • C:\Windows\SysWOW64\colorcpl.exe
            "C:\Windows\SysWOW64\colorcpl.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:884
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\order no. 43453.exe"
              5⤵
              • Deletes itself
              PID:1132

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp2E03.tmp
      MD5

      ef08fcaf233ff6a1f0e0d8fd29e8aaca

      SHA1

      ffbe1494b0658f06df1edb6205ab6e55fcfdd04c

      SHA256

      66272917242f4a1d4975a9791e4df185e397961ce8b05c32c3c4201e4cb6f832

      SHA512

      6c47832f50be85835375acddb2dffa3a462bc5c53a7bd780153315b63faeab2ea959d9c8b3e76421565df8fd535051d149bf66c8f8ca18019d1476872272b502

    • memory/584-7-0x0000000000000000-mapping.dmp
    • memory/884-15-0x0000000004470000-0x000000000455F000-memory.dmp
      Filesize

      956KB

    • memory/884-13-0x00000000007E0000-0x00000000007F8000-memory.dmp
      Filesize

      96KB

    • memory/884-12-0x0000000000000000-mapping.dmp
    • memory/1036-6-0x0000000005490000-0x00000000054F7000-memory.dmp
      Filesize

      412KB

    • memory/1036-2-0x0000000074900000-0x0000000074FEE000-memory.dmp
      Filesize

      6.9MB

    • memory/1036-5-0x0000000000200000-0x0000000000212000-memory.dmp
      Filesize

      72KB

    • memory/1036-3-0x0000000000230000-0x0000000000231000-memory.dmp
      Filesize

      4KB

    • memory/1132-14-0x0000000000000000-mapping.dmp
    • memory/1196-11-0x0000000006F30000-0x000000000707A000-memory.dmp
      Filesize

      1.3MB

    • memory/1196-16-0x0000000003CA0000-0x0000000003D82000-memory.dmp
      Filesize

      904KB

    • memory/1484-9-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1484-10-0x000000000041D110-mapping.dmp