Resubmissions

17-01-2021 17:37

210117-8783bhgtqn 10

16-01-2021 07:26

210116-jmhdlhy2pe 10

Analysis

  • max time kernel
    38s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    16-01-2021 07:26

General

  • Target

    eaae6c96269eff1ba5834ce343a2d1bf.exe

  • Size

    395KB

  • MD5

    eaae6c96269eff1ba5834ce343a2d1bf

  • SHA1

    23917bba7902c5c54f36f863b374795ac5615324

  • SHA256

    57fcc02e839d4ae0b8965ed55738960a952006f5e70ee1317f2bfacb97a43a5f

  • SHA512

    c494c998ff4997e72265db49d13e6ed6d5db05d36ac9ed3b19a65664b11f79f7c99ea8ad442e053eed97b14cb5cf4c329202781522de97a1ab35a143e2d5c243

Malware Config

Extracted

Family

formbook

C2

http://www.herbmedia.net/csv8/

Decoy

slgacha.com

oohdough.com

6983ylc.com

aykassociate.com

latin-hotspot.com

starrockindia.com

beamsubway.com

queensboutique1000.com

madbaddie.com

bhoomimart.com

ankitparivar.com

aldanasanchezmx.com

citest1597669833.com

cristianofreitas.com

myplantus.com

counterfeitmilk.com

8xf39.com

pregnantwomens.com

yyyut6.com

stnanguo.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\eaae6c96269eff1ba5834ce343a2d1bf.exe
    "C:\Users\Admin\AppData\Local\Temp\eaae6c96269eff1ba5834ce343a2d1bf.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CmpmdTAj" /XML "C:\Users\Admin\AppData\Local\Temp\tmpBCAB.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1216
    • C:\Users\Admin\AppData\Local\Temp\eaae6c96269eff1ba5834ce343a2d1bf.exe
      "{path}"
      2⤵
        PID:1688
      • C:\Users\Admin\AppData\Local\Temp\eaae6c96269eff1ba5834ce343a2d1bf.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1640

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpBCAB.tmp
      MD5

      4f032319b43f3c72da762b076ad551a2

      SHA1

      1cfb5ac7492c557e61d25b454551ddadbc1e7bfd

      SHA256

      a80d74e8efc74d57f255d6252b70dd2a53f0de04ae422e62c3a32f005396edbe

      SHA512

      58999ff5646fb65c61eae2944b1e0ed3a5672c59d813ebe892cafe71fb0362eed88743f63e3c0429de175e91e38433faf7df41b36d42da57e90efde888cbd713

    • memory/1216-7-0x0000000000000000-mapping.dmp
    • memory/1640-9-0x0000000000400000-0x0000000000429000-memory.dmp
      Filesize

      164KB

    • memory/1640-10-0x000000000041D0C0-mapping.dmp
    • memory/1696-2-0x0000000074D20000-0x000000007540E000-memory.dmp
      Filesize

      6.9MB

    • memory/1696-3-0x0000000000EA0000-0x0000000000EA1000-memory.dmp
      Filesize

      4KB

    • memory/1696-5-0x0000000000640000-0x000000000064E000-memory.dmp
      Filesize

      56KB

    • memory/1696-6-0x0000000005100000-0x0000000005148000-memory.dmp
      Filesize

      288KB