Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    26-05-2022 12:27

General

  • Target

    DOC.003242628829.DOC.exe

  • Size

    732KB

  • MD5

    ecd12e3c8ca76db51acba9eca5c8cb03

  • SHA1

    a2143148f95ed87259be98103621301e68bb1472

  • SHA256

    8bb0378626735cca62f8512257a07c429847109d26d5383cd7eb4915ac13ea4e

  • SHA512

    1e1b65160fcc35596c7f170891fa730ae8bb052cffe7c9185f0fad758c213cd96c30fbc4cb0061e0f583216f7c76a833c507419a4f62e458a3aee41f19c9ebcc

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

uj3c

Decoy

copimetro.com

choonchain.com

luxxwireless.com

fashionweekofcincinnati.com

campingshare.net

suncochina.com

kidsfundoor.com

testingnyc.co

lovesoe.com

vehiclesbeenrecord.com

socialpearmarketing.com

maxproductdji.com

getallarticle.online

forummind.com

arenamarenostrum.com

trisuaka.xyz

designgamagazine.com

chateaulehotel.com

huangse5.com

esginvestment.tech

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

modischoolcbse.com

theneverwinter.com

rszkjx-vps-hosting.website

fnihil.com

1pbet.com

nnowzscorrez.com

uaotgvjl.icu

starmapsqatar.com

ekisilani.com

extradeepsheets.com

jam-nins.com

buranly.com

orixentertainment.com

rawtech.energy

myol.guru

utex.club

jiapie.com

wowig.store

wweidlyyl.com

systaskautomation.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Formbook Payload 3 IoCs
  • ModiLoader Second Stage 56 IoCs
  • Xloader Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2604
    • C:\Users\Admin\AppData\Local\Temp\DOC.003242628829.DOC.exe
      "C:\Users\Admin\AppData\Local\Temp\DOC.003242628829.DOC.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Windows\SysWOW64\logagent.exe
        C:\Windows\System32\logagent.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1272
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:1104
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2888
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\SysWOW64\logagent.exe"
          3⤵
            PID:2828
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:3144
            • C:\Windows\SysWOW64\cmd.exe
              /c copy "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
              3⤵
                PID:1416
              • C:\Program Files\Mozilla Firefox\Firefox.exe
                "C:\Program Files\Mozilla Firefox\Firefox.exe"
                3⤵
                  PID:3752
                • C:\Users\Admin\AppData\Local\Temp\lzvhlr.exe
                  "C:\Users\Admin\AppData\Local\Temp\lzvhlr.exe"
                  3⤵
                  • Executes dropped EXE
                  • Adds Run key to start application
                  • Suspicious use of WriteProcessMemory
                  PID:2548
                  • C:\Windows\SysWOW64\DpiScaling.exe
                    C:\Windows\System32\DpiScaling.exe
                    4⤵
                    • Suspicious use of SetThreadContext
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious behavior: MapViewOfSection
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2108
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:1508
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:3220
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:936
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:1324
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:1236
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:1076
                          • C:\Windows\SysWOW64\systray.exe
                            "C:\Windows\SysWOW64\systray.exe"
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious behavior: MapViewOfSection
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:2116
                            • C:\Windows\SysWOW64\cmd.exe
                              /c del "C:\Windows\SysWOW64\DpiScaling.exe"
                              3⤵
                                PID:1732

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Defense Evasion

                          Modify Registry

                          2
                          T1112

                          Credential Access

                          Credentials in Files

                          1
                          T1081

                          Collection

                          Data from Local System

                          1
                          T1005

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
                            Filesize

                            1KB

                            MD5

                            14327e15c7f9b788b81cdd2876fa6a15

                            SHA1

                            aa33c25fcc75d89bd848ed9305dd639e1263a8c5

                            SHA256

                            3b1a8d0c3a3981c608a1f65359df0a6d5b70671ed40ff95b1db878afe2f2cfc2

                            SHA512

                            8b38316beac3f51524ce18917120a67390087d4bbdd2c341c8876e9038f5fa52c86bdb670a6d46970d24217e206c9076b300e03628b3775a51db02c56b23b349

                          • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_1DC6D7385EA816C957BA2B715AC5C442
                            Filesize

                            416B

                            MD5

                            c107a43a4d9162b45f6caf5fb05a5610

                            SHA1

                            6739b2133a8d1614bd67238ddcab7fd07f84ecb4

                            SHA256

                            765e3a318a3b778df98d8f8e89c6c8d389cd8f96f09a2605d0296280817ad155

                            SHA512

                            8186f3861df06741a664a2dd530337c9a7a995dea8e0bebb3bb210379ed2908f146e824b97c8f3e3be06bfee20fb46112eab764eb0ae13f07ca9ab5e254781de

                          • C:\Users\Admin\AppData\Local\Temp\DB1
                            Filesize

                            40KB

                            MD5

                            b608d407fc15adea97c26936bc6f03f6

                            SHA1

                            953e7420801c76393902c0d6bb56148947e41571

                            SHA256

                            b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

                            SHA512

                            cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

                          • C:\Users\Admin\AppData\Local\Temp\DB1
                            Filesize

                            48KB

                            MD5

                            349e6eb110e34a08924d92f6b334801d

                            SHA1

                            bdfb289daff51890cc71697b6322aa4b35ec9169

                            SHA256

                            c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

                            SHA512

                            2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

                          • C:\Users\Admin\AppData\Local\Temp\lzvhlr.exe
                            Filesize

                            854KB

                            MD5

                            63feb4e17a7b6d69a5cea92267498165

                            SHA1

                            e69fd171365574babdce4faa211eefc6cf7974c5

                            SHA256

                            54a3c88e1200de6b85c59ea6f37732d874bedfc21345d30e4f11a7376c3d3c98

                            SHA512

                            ea1690f221224bd6611fc828a657c06f0389591b853bfee56d8a1ee4c9f0b405034225a91edfd1193e4493b33dc9c15234482beb9c79777d5537ce524cec3947

                          • C:\Users\Admin\AppData\Local\Temp\lzvhlr.exe
                            Filesize

                            854KB

                            MD5

                            63feb4e17a7b6d69a5cea92267498165

                            SHA1

                            e69fd171365574babdce4faa211eefc6cf7974c5

                            SHA256

                            54a3c88e1200de6b85c59ea6f37732d874bedfc21345d30e4f11a7376c3d3c98

                            SHA512

                            ea1690f221224bd6611fc828a657c06f0389591b853bfee56d8a1ee4c9f0b405034225a91edfd1193e4493b33dc9c15234482beb9c79777d5537ce524cec3947

                          • memory/1032-171-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-170-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-173-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-150-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-151-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-148-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-153-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-154-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-155-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-156-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-152-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-158-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-157-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-159-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-160-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-161-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-162-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-164-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-163-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-165-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-167-0x0000000010410000-0x000000001043B000-memory.dmp
                            Filesize

                            172KB

                          • memory/1032-180-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-169-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-146-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-140-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-172-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-149-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-147-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-141-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-183-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-182-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-185-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-184-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-186-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-187-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-144-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-181-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-143-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-142-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1032-145-0x0000000003C90000-0x0000000003CE8000-memory.dmp
                            Filesize

                            352KB

                          • memory/1272-190-0x0000000002DD0000-0x0000000002DE1000-memory.dmp
                            Filesize

                            68KB

                          • memory/1272-189-0x0000000003030000-0x000000000337A000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/1272-168-0x0000000000000000-mapping.dmp
                          • memory/1416-201-0x0000000000000000-mapping.dmp
                          • memory/1732-275-0x0000000000000000-mapping.dmp
                          • memory/2108-246-0x0000000000000000-mapping.dmp
                          • memory/2108-266-0x0000000010410000-0x000000001043E000-memory.dmp
                            Filesize

                            184KB

                          • memory/2108-269-0x0000000003090000-0x00000000030A4000-memory.dmp
                            Filesize

                            80KB

                          • memory/2108-272-0x00000000030D0000-0x00000000030E4000-memory.dmp
                            Filesize

                            80KB

                          • memory/2108-268-0x0000000003190000-0x00000000034DA000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2116-274-0x0000000000000000-mapping.dmp
                          • memory/2116-276-0x0000000000B30000-0x0000000000B36000-memory.dmp
                            Filesize

                            24KB

                          • memory/2116-278-0x0000000002440000-0x000000000278A000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2116-277-0x00000000004F0000-0x000000000051E000-memory.dmp
                            Filesize

                            184KB

                          • memory/2548-223-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-232-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-221-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-220-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-222-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-224-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-218-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-225-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-227-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-226-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-229-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-228-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-231-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-230-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-233-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-219-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-234-0x0000000003CA0000-0x0000000003CFA000-memory.dmp
                            Filesize

                            360KB

                          • memory/2548-203-0x0000000000000000-mapping.dmp
                          • memory/2604-198-0x0000000002980000-0x0000000002A4E000-memory.dmp
                            Filesize

                            824KB

                          • memory/2604-270-0x0000000007020000-0x000000000717B000-memory.dmp
                            Filesize

                            1.4MB

                          • memory/2604-273-0x00000000082D0000-0x000000000843E000-memory.dmp
                            Filesize

                            1.4MB

                          • memory/2604-191-0x0000000002890000-0x0000000002976000-memory.dmp
                            Filesize

                            920KB

                          • memory/2828-193-0x0000000000000000-mapping.dmp
                          • memory/2888-197-0x0000000002820000-0x00000000028B0000-memory.dmp
                            Filesize

                            576KB

                          • memory/2888-196-0x0000000002AB0000-0x0000000002DFA000-memory.dmp
                            Filesize

                            3.3MB

                          • memory/2888-195-0x0000000000AF0000-0x0000000000B1B000-memory.dmp
                            Filesize

                            172KB

                          • memory/2888-194-0x0000000000F80000-0x0000000000F8C000-memory.dmp
                            Filesize

                            48KB

                          • memory/2888-192-0x0000000000000000-mapping.dmp
                          • memory/3144-199-0x0000000000000000-mapping.dmp