Analysis

  • max time kernel
    149s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-04-2022 01:06

General

  • Target

    000040021.exe

  • Size

    179KB

  • MD5

    6f6f64b82c949798ec80ecddea570ba9

  • SHA1

    9895fe43bf8b037ec9110294e681410f419cf64b

  • SHA256

    5978ce4905969580753f948beb8265a13d133cf29f9ddb206475a7f06f8fc885

  • SHA512

    263308644df6dfc89d2466646ec7fda1092150128af96b8c62050c1b30f8ee0f8b0fa4ed03a375f2c78e5f5926e7b043db65b9a8b484b1d5a88760bb628e6cc6

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

oh75

Decoy

denizgidam.com

6cc06.com

charlottewaldburgzeil.com

medijanus.com

qingdaoyiersan.com

datcabilgisayar.xyz

111439d.com

xn--1ruo40k.com

wu6enxwcx5h3.xyz

vnscloud.net

brtka.xyz

showztime.com

promocoesdedezenbro.com

wokpy.com

chnowuk.online

rockshotscafe.com

pelrjy.com

nato-riness.com

feixiang-chem.com

thcoinexchange.com

Extracted

Family

netwire

C2

127.0.0.1:3360

212.192.246.209:141

Attributes
  • activex_autorun

    false

  • activex_key

  • copy_executable

    false

  • delete_original

    false

  • host_id

    04-22

  • install_path

  • keylogger_dir

  • lock_executable

    false

  • mutex

  • offline_keylogger

    false

  • password

    123456

  • registry_autorun

    false

  • startup_name

    �k

  • use_mutex

    false

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • NetWire RAT payload 3 IoCs
  • Netwire

    Netwire is a RAT with main functionalities focused password stealing and keylogging, but also includes remote control capabilities as well.

  • Formbook Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Delays execution with timeout.exe 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 42 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\000040021.exe
      "C:\Users\Admin\AppData\Local\Temp\000040021.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe" /c timeout 10
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:976
        • C:\Windows\SysWOW64\timeout.exe
          timeout 10
          4⤵
          • Delays execution with timeout.exe
          PID:1996
      • C:\Users\Admin\AppData\Local\Temp\Kyxlubuhi.exe
        "C:\Users\Admin\AppData\Local\Temp\Kyxlubuhi.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1920
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c timeout 10
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:3488
          • C:\Windows\SysWOW64\timeout.exe
            timeout 10
            5⤵
            • Delays execution with timeout.exe
            PID:4408
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          4⤵
          • Adds Run key to start application
          PID:4240
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        3⤵
          PID:2416
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2556
      • C:\Windows\SysWOW64\WWAHost.exe
        "C:\Windows\SysWOW64\WWAHost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2720
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
            PID:5036

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\Kyxlubuhi.exe
        Filesize

        179KB

        MD5

        12c5bc1a739dfd4e5a54c0a1b47daff6

        SHA1

        e4d994d9a61824ada303d54448d2d384484a961c

        SHA256

        3ccf4ad2172cb3a4e39fbdb1692673d3d4e06541dff20bc896e033f2caeac28a

        SHA512

        e58795819fe73952529cee7f18a80bbfd0575d15b71b1a07e79e6832faf477653b718d70e881db43933876aaa58d723ad2f57479ce1dd327979a43185f9859dc

      • C:\Users\Admin\AppData\Local\Temp\Kyxlubuhi.exe
        Filesize

        179KB

        MD5

        12c5bc1a739dfd4e5a54c0a1b47daff6

        SHA1

        e4d994d9a61824ada303d54448d2d384484a961c

        SHA256

        3ccf4ad2172cb3a4e39fbdb1692673d3d4e06541dff20bc896e033f2caeac28a

        SHA512

        e58795819fe73952529cee7f18a80bbfd0575d15b71b1a07e79e6832faf477653b718d70e881db43933876aaa58d723ad2f57479ce1dd327979a43185f9859dc

      • C:\Users\Admin\AppData\Roaming\Nakgjel\Aoev.exe
        Filesize

        179KB

        MD5

        12c5bc1a739dfd4e5a54c0a1b47daff6

        SHA1

        e4d994d9a61824ada303d54448d2d384484a961c

        SHA256

        3ccf4ad2172cb3a4e39fbdb1692673d3d4e06541dff20bc896e033f2caeac28a

        SHA512

        e58795819fe73952529cee7f18a80bbfd0575d15b71b1a07e79e6832faf477653b718d70e881db43933876aaa58d723ad2f57479ce1dd327979a43185f9859dc

      • memory/372-130-0x0000000000F60000-0x0000000000F92000-memory.dmp
        Filesize

        200KB

      • memory/372-131-0x0000000005F90000-0x0000000006534000-memory.dmp
        Filesize

        5.6MB

      • memory/372-132-0x0000000005930000-0x00000000059C2000-memory.dmp
        Filesize

        584KB

      • memory/372-133-0x00000000059F0000-0x00000000059FA000-memory.dmp
        Filesize

        40KB

      • memory/976-134-0x0000000000000000-mapping.dmp
      • memory/1920-136-0x0000000000000000-mapping.dmp
      • memory/1920-139-0x00000000003F0000-0x0000000000422000-memory.dmp
        Filesize

        200KB

      • memory/1996-135-0x0000000000000000-mapping.dmp
      • memory/2416-140-0x0000000000000000-mapping.dmp
      • memory/2556-145-0x0000000001450000-0x000000000179A000-memory.dmp
        Filesize

        3.3MB

      • memory/2556-144-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/2556-141-0x0000000000000000-mapping.dmp
      • memory/2556-146-0x0000000001300000-0x0000000001314000-memory.dmp
        Filesize

        80KB

      • memory/2556-142-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/2720-152-0x0000000001B70000-0x0000000001EBA000-memory.dmp
        Filesize

        3.3MB

      • memory/2720-150-0x0000000000940000-0x0000000000A1C000-memory.dmp
        Filesize

        880KB

      • memory/2720-151-0x00000000007F0000-0x000000000081F000-memory.dmp
        Filesize

        188KB

      • memory/2720-148-0x0000000000000000-mapping.dmp
      • memory/2720-153-0x00000000010A0000-0x0000000001133000-memory.dmp
        Filesize

        588KB

      • memory/3148-147-0x0000000002720000-0x00000000027E1000-memory.dmp
        Filesize

        772KB

      • memory/3148-154-0x0000000002B70000-0x0000000002CF0000-memory.dmp
        Filesize

        1.5MB

      • memory/3488-155-0x0000000000000000-mapping.dmp
      • memory/4240-158-0x0000000000000000-mapping.dmp
      • memory/4240-159-0x0000000000400000-0x0000000000444000-memory.dmp
        Filesize

        272KB

      • memory/4240-161-0x0000000000400000-0x0000000000444000-memory.dmp
        Filesize

        272KB

      • memory/4240-162-0x0000000000400000-0x0000000000444000-memory.dmp
        Filesize

        272KB

      • memory/4408-156-0x0000000000000000-mapping.dmp
      • memory/5036-149-0x0000000000000000-mapping.dmp