Analysis

  • max time kernel
    172s
  • max time network
    187s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 09:40

General

  • Target

    SecuriteInfo.com.Win32.Trojan-gen.31819.exe

  • Size

    733KB

  • MD5

    f536ea8fb5b6586bb2ffc764cd52abff

  • SHA1

    313804060f2511b8382d369a3949d5524c1adaef

  • SHA256

    e539f80082f961c600e6ff2a21e969d0641aa787831259d3fdd772b28d469721

  • SHA512

    873e0a7174be40db35f8e8f06fd7ffaf340128e7ee6ec09f691ca8857aac9b1f4c5d6cdb76841858ef4e52b2fa5a4a9a18588221567626fe1474b8b101cef8ea

  • SSDEEP

    12288:i1qMhtVLzLypCggIh36+O9dvjpQVeri442qKk/RqIkr:WFhHzmQgn6+8T/r7PaqI

Malware Config

Extracted

Family

formbook

Campaign

nvp4

Decoy

EiywrQNofDNveWY1IESoBA==

yqEWFGRfErX7ICQCwyQ+YeLXtaA=

Ers0rc50nbjso0jbdZTmBw==

XQxVP45+F5OZn3ZBTC7MLe1OF3G5c5uK9A==

RHh4uwtsttjzlxy+eW3+

W+xQshfnvmF5n5x2d+cEVdBNIkQRHRE=

FwlyiuXNX0+Trw==

euLn91on/7DeDe++zbQ4YeLXtaA=

td4cO8m3HDRWtl8p7Q==

ZrlyAAPqc3GXI5k=

OM0IisKOI78FJC/IuIxxAu5nRg==

d6A0QJ6PV+AOpyK+eW3+

+EgxFWUu3Ulatl8p7Q==

GC/stck1ILXn+cWZx7w8W6rPFmO6c5uK9A==

hhIiK4+CKEOfB4tr

mA1pyQ85ye8N

4xgWYcEpEoidv8eXKNncAQ==

L+hOVbe+IWyc8oVUclc=

J7EGaJ+L+wKLXUYg7w==

L5R/nfdgQdMHD+TUKw1Zo3Hb

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • ModiLoader Second Stage 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Trojan-gen.31819.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.Trojan-gen.31819.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1672
      • C:\Windows\SysWOW64\wscript.exe
        C:\Windows\System32\wscript.exe
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1744
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3964

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Command-Line Interface

1
T1059

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1672-136-0x0000000010410000-0x000000001043F000-memory.dmp
    Filesize

    188KB

  • memory/1672-132-0x0000000002740000-0x000000000276B000-memory.dmp
    Filesize

    172KB

  • memory/1672-135-0x0000000010410000-0x000000001043F000-memory.dmp
    Filesize

    188KB

  • memory/1744-141-0x00000000037D0000-0x0000000003B1A000-memory.dmp
    Filesize

    3.3MB

  • memory/1744-138-0x0000000010410000-0x000000001043F000-memory.dmp
    Filesize

    188KB

  • memory/1744-139-0x0000000010411000-0x000000001043F000-memory.dmp
    Filesize

    184KB

  • memory/1744-149-0x0000000010411000-0x000000001043F000-memory.dmp
    Filesize

    184KB

  • memory/1744-142-0x0000000010432000-0x0000000010434000-memory.dmp
    Filesize

    8KB

  • memory/1744-143-0x0000000002300000-0x0000000002310000-memory.dmp
    Filesize

    64KB

  • memory/1744-134-0x0000000000000000-mapping.dmp
  • memory/1744-148-0x0000000010410000-0x000000001043F000-memory.dmp
    Filesize

    188KB

  • memory/2184-144-0x0000000002E80000-0x0000000002F5E000-memory.dmp
    Filesize

    888KB

  • memory/2184-154-0x00000000031D0000-0x00000000032FB000-memory.dmp
    Filesize

    1.2MB

  • memory/2184-152-0x00000000031D0000-0x00000000032FB000-memory.dmp
    Filesize

    1.2MB

  • memory/3964-145-0x0000000000000000-mapping.dmp
  • memory/3964-150-0x0000000001080000-0x00000000013CA000-memory.dmp
    Filesize

    3.3MB

  • memory/3964-151-0x0000000000EB0000-0x0000000000F3F000-memory.dmp
    Filesize

    572KB

  • memory/3964-147-0x00000000008B0000-0x00000000008DD000-memory.dmp
    Filesize

    180KB

  • memory/3964-153-0x00000000008B0000-0x00000000008DD000-memory.dmp
    Filesize

    180KB

  • memory/3964-146-0x0000000000D10000-0x0000000000D1B000-memory.dmp
    Filesize

    44KB