Analysis

  • max time kernel
    3s
  • max time network
    10s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    19-01-2021 07:05

General

  • Target

    f0f1a843b50f76e7236cc32dedf1d65d.exe

  • Size

    276KB

  • MD5

    f0f1a843b50f76e7236cc32dedf1d65d

  • SHA1

    f84f30a93355d46bbdbebfedc760188879b6db0b

  • SHA256

    3ed3126cfc3094e0f1a5736369cc55f68feb9bf6c9e31ba6e00e36f11917bc18

  • SHA512

    f856db58b39aacbc858a248a7352ee20e63ac3a50966ebb9a95bcacad6221d98eff7a8f4024fae08badfc45396a7312a8bf70e69e5802777b7e34ef6e48342a2

Malware Config

Extracted

Family

formbook

C2

http://www.douzhuan168.com/o8na/

Decoy

www1669099.com

digitalallserv.com

thiszzzwq.info

dallasoswalt.info

ladolcefesta.com

mariamalikially.com

origenbsas.com

antichoc.watch

tropicalbirdtoys.com

bbluedotvrwdbuy.com

racevx.xyz

ut-trustandwill.com

maximumhomeoffers.com

wrapname.com

hypelighystrip.com

oshoum2020.com

parkwestmi.com

themodumall.com

tempuslawnandsnow.com

dailypromo.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f0f1a843b50f76e7236cc32dedf1d65d.exe
    "C:\Users\Admin\AppData\Local\Temp\f0f1a843b50f76e7236cc32dedf1d65d.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1684
    • C:\Users\Admin\AppData\Local\Temp\f0f1a843b50f76e7236cc32dedf1d65d.exe
      "C:\Users\Admin\AppData\Local\Temp\f0f1a843b50f76e7236cc32dedf1d65d.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1948

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1684-2-0x0000000004F40000-0x0000000004F51000-memory.dmp
    Filesize

    68KB

  • memory/1684-5-0x0000000000020000-0x0000000000040000-memory.dmp
    Filesize

    128KB

  • memory/1684-6-0x0000000000220000-0x000000000024A000-memory.dmp
    Filesize

    168KB

  • memory/1948-4-0x000000000041D040-mapping.dmp
  • memory/1948-3-0x0000000000400000-0x0000000000428000-memory.dmp
    Filesize

    160KB

  • memory/1948-8-0x0000000000830000-0x0000000000B33000-memory.dmp
    Filesize

    3.0MB