Analysis

  • max time kernel
    120s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 07:31

General

  • Target

    Consignment Document PL&BL Draft.exe

  • Size

    318KB

  • MD5

    ef20635d931f69c41175aa8f1d81d60c

  • SHA1

    3e00db6de337ef48f82ed1af80ca998ea86c5601

  • SHA256

    444e72d12e85dffc1b247b29e7789022b251237f56ea83bf72e3c09fcb628874

  • SHA512

    d9131029f0dbf8f59fa761031f0962c75dbbf138a97344e242434b324110fda7b7e9507b93bbd2224f5bd5cc654e7accce1e9994ddad499e386086d93ded5f13

Malware Config

Extracted

Family

formbook

C2

http://www.elevatedenterprizes.com/h3qo/

Decoy

dhflow.com

jyindex.com

ezcleanhandle.com

trungtamcongdong.online

simsprotectionagency.com

easylivemeet.com

blackvikingfashionhouse.com

52banxue.com

girlsinit.com

drhemo.com

freethefarmers.com

velvetrosephotography.com

geometricbotaniclas.com

skyandspirit.com

deltacomunicacao.com

mucademy.com

jaboilfieldsolutions.net

howtowinatblackjacknow.com

anytimegrowth.com

simranluthra.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Consignment Document PL&BL Draft.exe
    "C:\Users\Admin\AppData\Local\Temp\Consignment Document PL&BL Draft.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\Consignment Document PL&BL Draft.exe
      "C:\Users\Admin\AppData\Local\Temp\Consignment Document PL&BL Draft.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 36
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1740

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1736-2-0x00000000000B0000-0x00000000000D9000-memory.dmp

    Filesize

    164KB

  • memory/1736-3-0x00000000000CD0E0-mapping.dmp

  • memory/1740-5-0x0000000000000000-mapping.dmp

  • memory/1740-6-0x0000000001FC0000-0x0000000001FD1000-memory.dmp

    Filesize

    68KB

  • memory/1740-7-0x00000000024B0000-0x00000000024C1000-memory.dmp

    Filesize

    68KB