Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    22-06-2022 15:57

General

  • Target

    SecuriteInfo.com.Trojan.Win32.Fareit.9a2b145f.1321.exe

  • Size

    684KB

  • MD5

    fc54c57b9b4181c30db0748d08cf5450

  • SHA1

    6f2d9b31ff707bdae54cb6b43678e1a4ccfae2d9

  • SHA256

    405fde3cb4a7bce2ea1037d3ad8d241459607340c1a4748599736fd3acdd26b9

  • SHA512

    b75e0cec6f21b9b7c21927b30ada739a7eff793cb7bc2b411d31d4101714391a14df929d90bb2483dc4157677280d4e455097e73f3ad507038ffa2f9f43ab37d

Malware Config

Extracted

Family

xloader

Version

2.6

Campaign

gqvv

Decoy

keyclash.com

canadianinspiration.com

testmanagement.xyz

doxpunk.xyz

kodacult.com

snatchbra.net

313370955.com

sarochin.com

norozoto.xyz

nbpanthers.com

colombiaartesanias.com

m57hwtiuu7h.com

tsaerac.com

alugiare.com

elizeusomautomotivo.com

fgijjisdifsd.xyz

isecurewebsites.com

incomeviaonline.com

caribbeanbrunch.com

alveus-solarboote.com

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

modischoolcbse.com

theneverwinter.com

rszkjx-vps-hosting.website

fnihil.com

1pbet.com

nnowzscorrez.com

uaotgvjl.icu

starmapsqatar.com

ekisilani.com

extradeepsheets.com

jam-nins.com

buranly.com

orixentertainment.com

rawtech.energy

myol.guru

utex.club

jiapie.com

wowig.store

wweidlyyl.com

systaskautomation.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Formbook Payload 4 IoCs
  • ModiLoader Second Stage 56 IoCs
  • Xloader Payload 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Fareit.9a2b145f.1321.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.Win32.Fareit.9a2b145f.1321.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:4776
      • C:\Windows\SysWOW64\logagent.exe
        C:\Windows\System32\logagent.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4288
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:572
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\logagent.exe"
        3⤵
          PID:4632
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:1760
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Microsoft\Edge\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:2552
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              3⤵
                PID:2968
              • C:\Users\Admin\AppData\Local\Temp\q0hpi.exe
                "C:\Users\Admin\AppData\Local\Temp\q0hpi.exe"
                3⤵
                • Executes dropped EXE
                • Adds Run key to start application
                • Suspicious use of WriteProcessMemory
                PID:3252
                • C:\Windows\SysWOW64\DpiScaling.exe
                  C:\Windows\System32\DpiScaling.exe
                  4⤵
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  PID:5088
            • C:\Windows\SysWOW64\control.exe
              "C:\Windows\SysWOW64\control.exe"
              2⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1392
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Windows\SysWOW64\DpiScaling.exe"
                3⤵
                  PID:1656

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            2
            T1060

            Defense Evasion

            Modify Registry

            3
            T1112

            Credential Access

            Credentials in Files

            1
            T1081

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
              Filesize

              471B

              MD5

              f581113326b75aac5918a48b3b687a60

              SHA1

              50d4b8ca027a4b7bef3a6dd6d5d6d986c85a856a

              SHA256

              0d707460b60f8c1cbf7b1a88ac39ad0b1815ef5e689372360545680fa51eabda

              SHA512

              204cdd8e4ad0f976ba77672cea5c4376d5df1dadf39aad13768b276ab86356e8476b890563bc718278eb6ea3094b70cf1a306419f16fb243ebcf54686a3e09b4

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
              Filesize

              412B

              MD5

              f9713516e69dde8ba8deac7061e2fcd0

              SHA1

              04d40f575945a7daa4dfa7ec04db2b61059c6ebc

              SHA256

              de9453cf9f23a863a030eab317eea070cf6e15aa66befdc9f998d7c7c09630da

              SHA512

              4a0104fbba5a3bbc40f39cddff9c15fa753ea815e9740a95352c43e46e6785258e3ccf47e6f2ae7358df543b386940875ecf109944c2189294a3decde985a241

            • C:\Users\Admin\AppData\Local\Temp\DB1
              Filesize

              40KB

              MD5

              b608d407fc15adea97c26936bc6f03f6

              SHA1

              953e7420801c76393902c0d6bb56148947e41571

              SHA256

              b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

              SHA512

              cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

            • C:\Users\Admin\AppData\Local\Temp\DB1
              Filesize

              48KB

              MD5

              349e6eb110e34a08924d92f6b334801d

              SHA1

              bdfb289daff51890cc71697b6322aa4b35ec9169

              SHA256

              c9fd7be4579e4aa942e8c2b44ab10115fa6c2fe6afd0c584865413d9d53f3b2a

              SHA512

              2a635b815a5e117ea181ee79305ee1baf591459427acc5210d8c6c7e447be3513ead871c605eb3d32e4ab4111b2a335f26520d0ef8c1245a4af44e1faec44574

            • C:\Users\Admin\AppData\Local\Temp\q0hpi.exe
              Filesize

              684KB

              MD5

              e45ddf8b2f8ec6c096ffb46a367cbaed

              SHA1

              8cb4e7165e00386838a06ea6e72cd3d59c4658aa

              SHA256

              5199d410f2ecd1acd82ab18e43e313dcf70b4b58295c3f5dd061118b195e29e6

              SHA512

              6012dfdb7f88ee03c546f11e3329bd74ed3d8ca4bf9cb154ba42539591b28a476d2917df4f192f21e43275ab19a2f75bb934083b483683dd50eea4d76e6504ba

            • C:\Users\Admin\AppData\Local\Temp\q0hpi.exe
              Filesize

              684KB

              MD5

              e45ddf8b2f8ec6c096ffb46a367cbaed

              SHA1

              8cb4e7165e00386838a06ea6e72cd3d59c4658aa

              SHA256

              5199d410f2ecd1acd82ab18e43e313dcf70b4b58295c3f5dd061118b195e29e6

              SHA512

              6012dfdb7f88ee03c546f11e3329bd74ed3d8ca4bf9cb154ba42539591b28a476d2917df4f192f21e43275ab19a2f75bb934083b483683dd50eea4d76e6504ba

            • memory/572-193-0x0000000000000000-mapping.dmp
            • memory/572-195-0x0000000000590000-0x00000000005B7000-memory.dmp
              Filesize

              156KB

            • memory/572-196-0x00000000010F0000-0x000000000111B000-memory.dmp
              Filesize

              172KB

            • memory/572-197-0x0000000002F40000-0x000000000328A000-memory.dmp
              Filesize

              3.3MB

            • memory/572-198-0x0000000002DE0000-0x0000000002E70000-memory.dmp
              Filesize

              576KB

            • memory/572-200-0x00000000010F0000-0x000000000111B000-memory.dmp
              Filesize

              172KB

            • memory/1392-276-0x0000000000590000-0x00000000005B7000-memory.dmp
              Filesize

              156KB

            • memory/1392-278-0x0000000002B40000-0x0000000002E8A000-memory.dmp
              Filesize

              3.3MB

            • memory/1392-274-0x0000000000000000-mapping.dmp
            • memory/1392-281-0x0000000000980000-0x00000000009AE000-memory.dmp
              Filesize

              184KB

            • memory/1392-277-0x0000000000980000-0x00000000009AE000-memory.dmp
              Filesize

              184KB

            • memory/1392-279-0x00000000028B0000-0x0000000002943000-memory.dmp
              Filesize

              588KB

            • memory/1656-275-0x0000000000000000-mapping.dmp
            • memory/1760-202-0x0000000000000000-mapping.dmp
            • memory/2240-201-0x00000000087F0000-0x00000000088A6000-memory.dmp
              Filesize

              728KB

            • memory/2240-199-0x00000000087F0000-0x00000000088A6000-memory.dmp
              Filesize

              728KB

            • memory/2240-192-0x00000000081E0000-0x000000000832D000-memory.dmp
              Filesize

              1.3MB

            • memory/2240-273-0x00000000088B0000-0x00000000089DE000-memory.dmp
              Filesize

              1.2MB

            • memory/2240-280-0x0000000008A50000-0x0000000008AFD000-memory.dmp
              Filesize

              692KB

            • memory/2240-282-0x0000000008A50000-0x0000000008AFD000-memory.dmp
              Filesize

              692KB

            • memory/2552-204-0x0000000000000000-mapping.dmp
            • memory/3252-228-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-206-0x0000000000000000-mapping.dmp
            • memory/3252-237-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-236-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-235-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-234-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-233-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-232-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-229-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-231-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-230-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-225-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-227-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-226-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-224-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-223-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-222-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/3252-221-0x00000000036D0000-0x0000000003724000-memory.dmp
              Filesize

              336KB

            • memory/4288-168-0x0000000000000000-mapping.dmp
            • memory/4288-191-0x0000000002CA0000-0x0000000002CB1000-memory.dmp
              Filesize

              68KB

            • memory/4288-189-0x0000000010410000-0x000000001043B000-memory.dmp
              Filesize

              172KB

            • memory/4288-190-0x0000000002D90000-0x00000000030DA000-memory.dmp
              Filesize

              3.3MB

            • memory/4632-194-0x0000000000000000-mapping.dmp
            • memory/4776-183-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-159-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-160-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-185-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-158-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-157-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-156-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-155-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-167-0x0000000010410000-0x000000001043B000-memory.dmp
              Filesize

              172KB

            • memory/4776-154-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-163-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-152-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-184-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-170-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-162-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-164-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-165-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-186-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-187-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-140-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-153-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-161-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-151-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-181-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-182-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-180-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-173-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-172-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-171-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-169-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-141-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-142-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-143-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-150-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-144-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-149-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-148-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-147-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-146-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/4776-145-0x0000000003B90000-0x0000000003BE2000-memory.dmp
              Filesize

              328KB

            • memory/5088-272-0x0000000002670000-0x0000000002684000-memory.dmp
              Filesize

              80KB

            • memory/5088-271-0x0000000002880000-0x0000000002BCA000-memory.dmp
              Filesize

              3.3MB

            • memory/5088-270-0x0000000010410000-0x000000001043E000-memory.dmp
              Filesize

              184KB

            • memory/5088-249-0x0000000000000000-mapping.dmp