Analysis

  • max time kernel
    5s
  • max time network
    13s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 12:15

General

  • Target

    7195211e786ecd993b3c6a3176942d15.exe

  • Size

    432KB

  • MD5

    7195211e786ecd993b3c6a3176942d15

  • SHA1

    b654f8e012d933e295b48d427d8939265d50a5e2

  • SHA256

    5551c39b0838a38711babfe60b36dda8855791ce1512553858fbaff025d31122

  • SHA512

    b784bce514162fa73dc1e3a9f63a6daaaac5037a636e0ab3645a1573cd5c1de1d71dbb7abed9a2ccfb50197c6d22f1102f547ae6bb87d765627ac84d53df47c2

Malware Config

Extracted

Family

formbook

C2

http://www.inreachpt.com/gqx2/

Decoy

calusaptamiami.com

starlinkwebservices.com

lakeviewbarbershonola.com

oaklandraidersjerseyspop.com

ohiotechreport.com

eligetucafetera.com

tu4343.com

abstract-elearning.com

thebabylashes.com

athleteshive.com

fanninhomesforless.com

sembracna.com

servicesyn.com

bellairechoice.com

tmpaas.com

eyepaa.com

stickerzblvd.com

rentfs.com

nadya-shanab.com

microwgreens.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe
    "C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe
      "C:\Users\Admin\AppData\Local\Temp\7195211e786ecd993b3c6a3176942d15.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1496
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1684 -s 664
      2⤵
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1932

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1496-8-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1496-9-0x000000000041D070-mapping.dmp

  • memory/1496-11-0x0000000000800000-0x0000000000B03000-memory.dmp

    Filesize

    3.0MB

  • memory/1684-2-0x0000000074670000-0x0000000074D5E000-memory.dmp

    Filesize

    6.9MB

  • memory/1684-3-0x0000000000120000-0x0000000000121000-memory.dmp

    Filesize

    4KB

  • memory/1684-5-0x0000000001F40000-0x0000000001F96000-memory.dmp

    Filesize

    344KB

  • memory/1684-6-0x0000000000390000-0x000000000039F000-memory.dmp

    Filesize

    60KB

  • memory/1684-7-0x00000000049F0000-0x00000000049F1000-memory.dmp

    Filesize

    4KB

  • memory/1932-12-0x0000000000000000-mapping.dmp

  • memory/1932-13-0x0000000001D80000-0x0000000001D91000-memory.dmp

    Filesize

    68KB

  • memory/1932-14-0x0000000000630000-0x0000000000631000-memory.dmp

    Filesize

    4KB