Analysis
-
max time kernel
146s -
max time network
139s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
15-01-2021 07:17
Static task
static1
Behavioral task
behavioral1
Sample
Mitsubishi Japan XN501.exe
Resource
win7v20201028
General
-
Target
Mitsubishi Japan XN501.exe
-
Size
959KB
-
MD5
420a7a5ed66a75a7ede35f63cab3ab9c
-
SHA1
474b0ef1e7dab85ebd7296c408de13a18afd3870
-
SHA256
75f2a2a20e73b7e0c53d499b883a403c2b8cfbf17c5923d58e0167daa4c019c1
-
SHA512
cafe8be480487d71115512894798775d3eb4e3219f3e0d5395d5c6a098d51515fb85a1224c12ce22d0fb8bacc612d48fdc417fe077d4bfbbf35fd7f53c47df20
Malware Config
Extracted
formbook
http://www.9dgevjb.net/gtl/
45687g.net
graveimport.com
bulldogsgear.com
service-support.email
uhzcflg.icu
zebradefensefund.com
make10xhappen.com
ecotegral.online
stillatwink.site
onwardatlanta.com
real-optionstheory.com
madbearcustomwoodworking.com
adelinekaczmarek.com
elia-lca.com
tinykreations.com
rawlinsrealty.info
ubcholdings.com
searko.com
lepinedoree.com
fundsrecoveryexperts.com
hdbymaggie.com
melhoresradios.com
natachez.com
nosquitos.com
skfashion-bd.com
healthyhabitsdiary.com
figcondos.com
torontobet109.xyz
k5759.com
everythingnitro.com
yolocraft.online
girlsweet88.online
beiser-sa.com
blackcardofsuccess.com
aprodigaldaughter.com
nxjiuding.com
objetboiscreative.com
angelinafurusho.com
uavphotoworld.com
melbet-official-bk-info.com
besthalalguide.com
samsungbtb.com
illawarrablinds.com
ratgeber-aktuell.info
tiktokmerch.club
zx565.com
sit-techno.com
leveragewholesaler.com
mymailtek.com
xb-xsy.com
caileygrunhard.com
pibyx.com
rnshaircare.com
todopilates.com
aureusgoldcorp.com
lblcclkchain.com
starlyconsulting.com
ndjamua.com
ahoradanoticia.net
mtcrosbyphotography.com
cutecvv.business
dach-realestate.com
assetmanagmentservices.com
sainu.website
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral2/memory/1300-11-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral2/memory/1300-12-0x000000000041EAF0-mapping.dmp formbook behavioral2/memory/2232-13-0x0000000000000000-mapping.dmp formbook -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Mitsubishi Japan XN501.exeMitsubishi Japan XN501.exeipconfig.exedescription pid process target process PID 1400 set thread context of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 1300 set thread context of 3024 1300 Mitsubishi Japan XN501.exe Explorer.EXE PID 2232 set thread context of 3024 2232 ipconfig.exe Explorer.EXE -
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 2232 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 44 IoCs
Processes:
Mitsubishi Japan XN501.exeipconfig.exepid process 1300 Mitsubishi Japan XN501.exe 1300 Mitsubishi Japan XN501.exe 1300 Mitsubishi Japan XN501.exe 1300 Mitsubishi Japan XN501.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe 2232 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Mitsubishi Japan XN501.exeipconfig.exepid process 1300 Mitsubishi Japan XN501.exe 1300 Mitsubishi Japan XN501.exe 1300 Mitsubishi Japan XN501.exe 2232 ipconfig.exe 2232 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Mitsubishi Japan XN501.exeipconfig.exedescription pid process Token: SeDebugPrivilege 1300 Mitsubishi Japan XN501.exe Token: SeDebugPrivilege 2232 ipconfig.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
Explorer.EXEpid process 3024 Explorer.EXE -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
Mitsubishi Japan XN501.exeExplorer.EXEipconfig.exedescription pid process target process PID 1400 wrote to memory of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 1400 wrote to memory of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 1400 wrote to memory of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 1400 wrote to memory of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 1400 wrote to memory of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 1400 wrote to memory of 1300 1400 Mitsubishi Japan XN501.exe Mitsubishi Japan XN501.exe PID 3024 wrote to memory of 2232 3024 Explorer.EXE ipconfig.exe PID 3024 wrote to memory of 2232 3024 Explorer.EXE ipconfig.exe PID 3024 wrote to memory of 2232 3024 Explorer.EXE ipconfig.exe PID 2232 wrote to memory of 2168 2232 ipconfig.exe cmd.exe PID 2232 wrote to memory of 2168 2232 ipconfig.exe cmd.exe PID 2232 wrote to memory of 2168 2232 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Mitsubishi Japan XN501.exe"C:\Users\Admin\AppData\Local\Temp\Mitsubishi Japan XN501.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1400 -
C:\Users\Admin\AppData\Local\Temp\Mitsubishi Japan XN501.exe"{path}"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
PID:1300 -
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Mitsubishi Japan XN501.exe"3⤵PID:2168