Analysis

  • max time kernel
    151s
  • max time network
    173s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-10-2022 10:51

General

  • Target

    SOA_Invoice_04930.exe

  • Size

    620KB

  • MD5

    e980fe4c7833022bb80b70abdda382de

  • SHA1

    8d82c1696df13202dc4d41f23c6df7f5fe18abee

  • SHA256

    8a9a70ca1dd6bd611d2b77bf233ab14f62b259d510973722a1381c237b4980f9

  • SHA512

    72ab8d6ce9e55266a45d60f046ec44df1ab51c6ff20e8f0a8376285921672f9efad57c22a52d2962556dd228d18b28e3d16dc8c3266f0837745ac9f089d5d68f

  • SSDEEP

    12288:NToPWBv/cpGrU3ypp8sGT72T4g+mtCYd/1l1fS7:NTbBv5rUOysGf2kxgN9fQ

Malware Config

Extracted

Family

formbook

Campaign

hzb3

Decoy

BVGWUXYpaaEaNSjsCHhJnDJz463cqQ==

CEqdZb0KaOLLbWqrDVTgc20=

nBv0jSFiQHxtE6awQnm2

E1sGpCJYtB8ImaguUyF6yQ==

PMBND7LzJGZH7CXulclbs2c=

u9zzlFGDXo6LLbGwQnm2

SaJjLbtVlMgsP5ZQRj4=

wckwEbwBbKA2X3g=

rPxB8ePUxfu4pilu

S562QFeKY5P//qawQnm2

BkEfWXZuY3ihKW8=

ZanakqMxkP7VdNfWdD4FGDqF

PYYbtzdINC1J0OYzQCk=

Fmg9LBxaPQ==

4eXWfoC06yGAkQ0l+Txs2w==

n68j2X6+CIhsD5GiCMYBsHI=

hRv6hpW3qfLbdI1XJ/J825G1TslJ+1JE

X6PAVGfwPHihKW8=

7zn1tkuDaZ2FKbGwQnm2

lB0m5ghWsSmMpIUS8EBM31l/463cqQ==

Extracted

Family

xloader

Version

3.8

Campaign

hzb3

Decoy

BVGWUXYpaaEaNSjsCHhJnDJz463cqQ==

CEqdZb0KaOLLbWqrDVTgc20=

nBv0jSFiQHxtE6awQnm2

E1sGpCJYtB8ImaguUyF6yQ==

PMBND7LzJGZH7CXulclbs2c=

u9zzlFGDXo6LLbGwQnm2

SaJjLbtVlMgsP5ZQRj4=

wckwEbwBbKA2X3g=

rPxB8ePUxfu4pilu

S562QFeKY5P//qawQnm2

BkEfWXZuY3ihKW8=

ZanakqMxkP7VdNfWdD4FGDqF

PYYbtzdINC1J0OYzQCk=

Fmg9LBxaPQ==

4eXWfoC06yGAkQ0l+Txs2w==

n68j2X6+CIhsD5GiCMYBsHI=

hRv6hpW3qfLbdI1XJ/J825G1TslJ+1JE

X6PAVGfwPHihKW8=

7zn1tkuDaZ2FKbGwQnm2

lB0m5ghWsSmMpIUS8EBM31l/463cqQ==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 13 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1300
    • C:\Users\Admin\AppData\Local\Temp\SOA_Invoice_04930.exe
      "C:\Users\Admin\AppData\Local\Temp\SOA_Invoice_04930.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:552
      • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
        "C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2044
        • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
          "C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:972
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 192
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:1204
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1976
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:836

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • C:\Users\Admin\AppData\Local\Temp\trgqsjkygi.zkc
      Filesize

      185KB

      MD5

      884f2e5433ac0ba1ab3ff5dff446b118

      SHA1

      c440ef9ce933150e8f63066e33c50a9f7dc6a653

      SHA256

      8df82e1f8dcbda6ed3ab7099e492db2af137764c8ba46e2e9cadbb2c6e7a3d45

      SHA512

      b7d5db1ce13689590860f849fbb813659997db97b78f0386eff740e5f7de15364e77869bf01fc2d4b4ae9379d034717a45c1cf9b747049e1c4294f15d0b500ec

    • C:\Users\Admin\AppData\Local\Temp\tujmf.ukj
      Filesize

      4KB

      MD5

      322c9e1f0800f6b6086e0b7e8593d0a8

      SHA1

      f562b549ee754cd3028f270c0e5fb6cac1b271ed

      SHA256

      9c65bfce3e58d250da6a8db7f15de36427b7fcaef404f77afd539c45d747026d

      SHA512

      79f389ac5d06bcfff0de14ca2101b0eef76cd032f1a6f90fb8f82cfdc7b1ae3b376877f62e715740854fd4908f0aa9cecb88e8b220988812cdf4201b04cdf1c0

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
      Filesize

      56KB

      MD5

      f57bc9937d91e877bfa7a67a22c9f2a1

      SHA1

      37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

      SHA256

      4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

      SHA512

      2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll
      Filesize

      890KB

      MD5

      8402a6aa76d7787ff03943dd129e3d83

      SHA1

      895338cb761d62930ca93918011fd2cd33d5b30c

      SHA256

      49ff99d5b24f4f7d5a8ea175f35a6548c74b04e5c621c60121b5088dab19b4eb

      SHA512

      39bbe90385be35492825929296aae771fb4afb00a1f6a48f0e4ec17bc1097c3a32cea3b22033116c82695e66acbd6c847483a8da21e7302240467b58e39169ea

    • memory/552-54-0x0000000075131000-0x0000000075133000-memory.dmp
      Filesize

      8KB

    • memory/972-67-0x00000000004012B0-mapping.dmp
    • memory/972-75-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/972-76-0x0000000000BE0000-0x0000000000EE3000-memory.dmp
      Filesize

      3.0MB

    • memory/972-77-0x00000000000B0000-0x00000000000C0000-memory.dmp
      Filesize

      64KB

    • memory/1204-69-0x0000000000000000-mapping.dmp
    • memory/1300-78-0x0000000004AF0000-0x0000000004BAC000-memory.dmp
      Filesize

      752KB

    • memory/1300-87-0x0000000006580000-0x00000000066B9000-memory.dmp
      Filesize

      1.2MB

    • memory/1300-84-0x0000000006580000-0x00000000066B9000-memory.dmp
      Filesize

      1.2MB

    • memory/1976-81-0x00000000009A0000-0x0000000000CA3000-memory.dmp
      Filesize

      3.0MB

    • memory/1976-82-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1976-83-0x0000000000580000-0x000000000060F000-memory.dmp
      Filesize

      572KB

    • memory/1976-80-0x0000000000800000-0x0000000000806000-memory.dmp
      Filesize

      24KB

    • memory/1976-85-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1976-79-0x0000000000000000-mapping.dmp
    • memory/2044-60-0x0000000000000000-mapping.dmp