Resubmissions

17-01-2021 18:04

210117-l8yn9qfvys 10

15-01-2021 07:13

210115-1my76fq12x 10

Analysis

  • max time kernel
    148s
  • max time network
    146s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-01-2021 18:04

General

  • Target

    SUNEJ PAYMENT.exe

  • Size

    939KB

  • MD5

    b6b8a1ad3d8f308457b07b88afeab4cd

  • SHA1

    f49329c30a3870c5b4c0b988197045140a6d5c23

  • SHA256

    7aa2116b5dcb055987e0e18b5e2f869eae15f6093adfd55b6a6d28b8be53dcb4

  • SHA512

    7fc6887f80879d04ceac0b4a59f9cb5161a8f52474afa4f14394051ff4d2c2a63e9afd1729824a8ac39c4767e56a086e70072b4913096e3a1c18e8c26451b6d7

Malware Config

Extracted

Family

formbook

C2

http://www.a-emeservice.com/m8ec/

Decoy

thomascraigwealth.com

melbournemedicalhealth.net

tdxcoin.com

lukassbprojects.net

aldemallc.com

moqawalat-kuwait.com

txcsco.com

jobcarepro.com

sedotwcmedanmurah.com

niconthenine.com

radliffrehab.com

infiniteechogroup.com

stellantis-luxury-rent.com

ibusehat.info

resellerauctions.com

softwarexprogrammers.com

bumpnlifestyle.com

mintmacher.com

partapprintercare.com

justrightinsurance.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 34 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3108
    • C:\Users\Admin\AppData\Local\Temp\SUNEJ PAYMENT.exe
      "C:\Users\Admin\AppData\Local\Temp\SUNEJ PAYMENT.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4648
      • C:\Users\Admin\AppData\Local\Temp\SUNEJ PAYMENT.exe
        "C:\Users\Admin\AppData\Local\Temp\SUNEJ PAYMENT.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4220
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:3956
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:3988
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:4028
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:4080
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:3264
              • C:\Windows\SysWOW64\NETSTAT.EXE
                "C:\Windows\SysWOW64\NETSTAT.EXE"
                2⤵
                • Suspicious use of SetThreadContext
                • Gathers network information
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:3156
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Users\Admin\AppData\Local\Temp\SUNEJ PAYMENT.exe"
                  3⤵
                    PID:3276

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Execution

              Command-Line Interface

              1
              T1059

              Discovery

              System Information Discovery

              1
              T1082

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/3108-19-0x00000000068B0000-0x000000000699B000-memory.dmp
                Filesize

                940KB

              • memory/3108-9-0x0000000006BC0000-0x0000000006D1B000-memory.dmp
                Filesize

                1.4MB

              • memory/3108-11-0x00000000032A0000-0x0000000003376000-memory.dmp
                Filesize

                856KB

              • memory/3156-12-0x0000000000000000-mapping.dmp
              • memory/3156-17-0x0000000002E70000-0x0000000002F00000-memory.dmp
                Filesize

                576KB

              • memory/3156-16-0x0000000003010000-0x0000000003330000-memory.dmp
                Filesize

                3.1MB

              • memory/3156-15-0x0000000000560000-0x0000000000589000-memory.dmp
                Filesize

                164KB

              • memory/3156-14-0x0000000000E60000-0x0000000000E6B000-memory.dmp
                Filesize

                44KB

              • memory/3276-13-0x0000000000000000-mapping.dmp
              • memory/4220-8-0x0000000000B50000-0x0000000000B61000-memory.dmp
                Filesize

                68KB

              • memory/4220-10-0x0000000000C90000-0x0000000000CA1000-memory.dmp
                Filesize

                68KB

              • memory/4220-7-0x0000000001150000-0x0000000001470000-memory.dmp
                Filesize

                3.1MB

              • memory/4220-5-0x000000000041D0A0-mapping.dmp
              • memory/4220-4-0x0000000000400000-0x0000000000429000-memory.dmp
                Filesize

                164KB

              • memory/4648-2-0x0000000002B10000-0x0000000002B11000-memory.dmp
                Filesize

                4KB

              • memory/4648-3-0x0000000002B11000-0x0000000002B12000-memory.dmp
                Filesize

                4KB