Analysis

  • max time kernel
    46s
  • max time network
    71s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    19-04-2021 10:29

General

  • Target

    6.exe

  • Size

    906KB

  • MD5

    69802992de34a4988baf0045a2d1dccf

  • SHA1

    5a568d6d7a56a1f1bd81a6dd5a7487a7b7b6dff3

  • SHA256

    de9d32e10118cdc282e1e20d42c53c061f0d9c727c88af95f8d9059ea163e2f6

  • SHA512

    a1a5e73f86ab933256a3689c1ad06f17534a06ac0cc8446a5e23c462e787d56b9887399660823ebfed7b0069745624e48a8acd1575e98efcb273dbe006dfe202

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.info/n7ak/

Decoy

audereventur.com

huro14.com

wwwjinsha155.com

antiquevendor.com

samuraisoulfood.net

traffic4updates.download

hypersarv.com

rapport-happy-wedding.com

rokutechnosupport.online

allworljob.com

hanaleedossmann.com

kauai-marathon.com

bepbosch.com

kangen-international.com

zoneshopemenowz.com

belviderewrestling.com

ipllink.com

sellingforcreators.com

wwwswty6655.com

qtumboa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Modifies Installed Components in the registry 2 TTPs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Modifies registry class 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 8 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 8 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3092
    • C:\Users\Admin\AppData\Local\Temp\6.exe
      "C:\Users\Admin\AppData\Local\Temp\6.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:656
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3908
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Adds policy Run key to start application
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1276
  • C:\Windows\system32\werfault.exe
    werfault.exe /h /shared Global\7efeb39eb73b4ec79b320d71139ac639 /t 3096 /p 3092
    1⤵
      PID:2068
    • C:\Windows\explorer.exe
      explorer.exe
      1⤵
      • Modifies registry class
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3732
    • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
      "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
      1⤵
        PID:524
      • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
        "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
        1⤵
          PID:3356

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        3
        T1060

        Defense Evasion

        Modify Registry

        4
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/656-114-0x00000000005E0000-0x000000000072A000-memory.dmp
          Filesize

          1.3MB

        • memory/1276-123-0x0000000003250000-0x000000000327D000-memory.dmp
          Filesize

          180KB

        • memory/1276-125-0x0000000004FA0000-0x0000000005033000-memory.dmp
          Filesize

          588KB

        • memory/1276-124-0x0000000005250000-0x0000000005570000-memory.dmp
          Filesize

          3.1MB

        • memory/1276-121-0x0000000000000000-mapping.dmp
        • memory/1276-122-0x0000000000AB0000-0x0000000000EEF000-memory.dmp
          Filesize

          4.2MB

        • memory/3092-126-0x0000000006230000-0x0000000006386000-memory.dmp
          Filesize

          1.3MB

        • memory/3092-120-0x0000000008AB0000-0x0000000008C4F000-memory.dmp
          Filesize

          1.6MB

        • memory/3732-127-0x0000000000EC0000-0x0000000000EC1000-memory.dmp
          Filesize

          4KB

        • memory/3908-117-0x0000000010410000-0x000000001043D000-memory.dmp
          Filesize

          180KB

        • memory/3908-118-0x0000000005060000-0x0000000005380000-memory.dmp
          Filesize

          3.1MB

        • memory/3908-119-0x0000000005040000-0x0000000005054000-memory.dmp
          Filesize

          80KB

        • memory/3908-116-0x0000000002FE0000-0x0000000002FE1000-memory.dmp
          Filesize

          4KB

        • memory/3908-115-0x0000000000000000-mapping.dmp