Analysis

  • max time kernel
    54s
  • max time network
    9s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-01-2021 04:52

General

  • Target

    SecuriteInfo.com.BehavesLike.Win32.Fareit.bc.29468.exe

  • Size

    766KB

  • MD5

    966bd3909e4a80e50fee52f34ccc5123

  • SHA1

    b667bbefe1b59f3d215d8ee265c3a95f061e588e

  • SHA256

    ed035bd3cdab82c607f296fd966c4064f0f04c9011d9e7744ca3e7739ed7269b

  • SHA512

    c0a106c23d73514e21a9a276dfb868ea72036cdcc769f1e74a2177e779fbd7ae981f19b45530d8d285c65da01da175203b729fab7e6a5d2a364817b7c6a0c685

Malware Config

Extracted

Family

formbook

C2

http://www.rizrvd.com/bw82/

Decoy

fundamentaliemef.com

gallerybrows.com

leadeligey.com

octoberx2.online

climaxnovels.com

gdsjgf.com

curateherstories.com

blacksailus.com

yjpps.com

gmobilet.com

fcoins.club

foreverlive2027.com

healthyfifties.com

wmarquezy.com

housebulb.com

thebabyfriendly.com

primajayaintiperkasa.com

learnplaychess.com

chrisbubser.digital

xn--avenr-wsa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Fareit.bc.29468.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Fareit.bc.29468.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2008
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Fareit.bc.29468.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.BehavesLike.Win32.Fareit.bc.29468.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1056

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1056-8-0x0000000000400000-0x0000000000428000-memory.dmp

    Filesize

    160KB

  • memory/1056-9-0x000000000041CFF0-mapping.dmp

  • memory/1056-11-0x0000000000770000-0x0000000000A73000-memory.dmp

    Filesize

    3.0MB

  • memory/2008-2-0x0000000074BA0000-0x000000007528E000-memory.dmp

    Filesize

    6.9MB

  • memory/2008-3-0x0000000000CB0000-0x0000000000CB1000-memory.dmp

    Filesize

    4KB

  • memory/2008-5-0x0000000004920000-0x0000000004921000-memory.dmp

    Filesize

    4KB

  • memory/2008-6-0x00000000009F0000-0x0000000000A13000-memory.dmp

    Filesize

    140KB

  • memory/2008-7-0x00000000051A0000-0x0000000005200000-memory.dmp

    Filesize

    384KB