Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    21-01-2021 18:07

General

  • Target

    f69047c67c621e68c5b21d46fa60a629.exe

  • Size

    596KB

  • MD5

    f69047c67c621e68c5b21d46fa60a629

  • SHA1

    806f17aaa650c367015db5792319650b3bd59502

  • SHA256

    e29bf0082c57f6a228883a9c3c8b727dc68705f4780d6275870958c81d747290

  • SHA512

    7af7fe9f4181d099afb56f7ec58d51b441738dd19be46b0e07497737cb38568cc061b41d7623df08eaf6b4b902219e220fc923aaf72da8d4567e246e0fcb6289

Malware Config

Extracted

Family

formbook

C2

http://www.learnhour.net/eaud/

Decoy

modshiro.com

mademarketingoss.com

austinjourls.info

wayupteam.com

crossingfinger.com

interseptors.com

gigashit.com

livetigo.com

halamankuningindonesia.com

windhammills.com

aylinahmet.com

mbacexonan.website

shopboxbarcelona.com

youyeslive.com

coonlinesportsbooks.com

guorunme.com

putlocker2.site

pencueaidnetwork.com

likevector.com

vulcanudachi-proclub.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 28 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\f69047c67c621e68c5b21d46fa60a629.exe
      "C:\Users\Admin\AppData\Local\Temp\f69047c67c621e68c5b21d46fa60a629.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3596
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
        3⤵
          PID:3876

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2764-30-0x0000000004A10000-0x0000000004A9F000-memory.dmp
      Filesize

      572KB

    • memory/2764-29-0x0000000004CC0000-0x0000000004FE0000-memory.dmp
      Filesize

      3.1MB

    • memory/2764-27-0x0000000003030000-0x0000000003058000-memory.dmp
      Filesize

      160KB

    • memory/2764-26-0x00000000008F0000-0x000000000090F000-memory.dmp
      Filesize

      124KB

    • memory/2764-25-0x0000000000000000-mapping.dmp
    • memory/3020-21-0x0000000005180000-0x0000000005302000-memory.dmp
      Filesize

      1.5MB

    • memory/3020-31-0x0000000005310000-0x000000000541F000-memory.dmp
      Filesize

      1.1MB

    • memory/3300-10-0x0000000009010000-0x0000000009011000-memory.dmp
      Filesize

      4KB

    • memory/3300-3-0x0000000000DE0000-0x0000000000DE1000-memory.dmp
      Filesize

      4KB

    • memory/3300-12-0x0000000005963000-0x0000000005965000-memory.dmp
      Filesize

      8KB

    • memory/3300-13-0x0000000009470000-0x0000000009471000-memory.dmp
      Filesize

      4KB

    • memory/3300-14-0x0000000008F60000-0x0000000008F6F000-memory.dmp
      Filesize

      60KB

    • memory/3300-32-0x0000000005965000-0x0000000005966000-memory.dmp
      Filesize

      4KB

    • memory/3300-11-0x0000000009120000-0x0000000009121000-memory.dmp
      Filesize

      4KB

    • memory/3300-6-0x00000000056E0000-0x00000000056E1000-memory.dmp
      Filesize

      4KB

    • memory/3300-5-0x0000000005B40000-0x0000000005B41000-memory.dmp
      Filesize

      4KB

    • memory/3300-2-0x0000000073300000-0x00000000739EE000-memory.dmp
      Filesize

      6.9MB

    • memory/3300-22-0x0000000007330000-0x0000000007331000-memory.dmp
      Filesize

      4KB

    • memory/3300-23-0x00000000073C0000-0x00000000073C1000-memory.dmp
      Filesize

      4KB

    • memory/3300-24-0x0000000007380000-0x0000000007381000-memory.dmp
      Filesize

      4KB

    • memory/3300-9-0x0000000008EC0000-0x0000000008EFB000-memory.dmp
      Filesize

      236KB

    • memory/3300-8-0x00000000056B0000-0x00000000056B1000-memory.dmp
      Filesize

      4KB

    • memory/3300-7-0x0000000005960000-0x0000000005961000-memory.dmp
      Filesize

      4KB

    • memory/3596-16-0x000000000041D030-mapping.dmp
    • memory/3596-20-0x0000000000E10000-0x0000000000E20000-memory.dmp
      Filesize

      64KB

    • memory/3596-19-0x00000000010C0000-0x00000000013E0000-memory.dmp
      Filesize

      3.1MB

    • memory/3596-15-0x0000000000400000-0x0000000000428000-memory.dmp
      Filesize

      160KB

    • memory/3876-28-0x0000000000000000-mapping.dmp