Analysis

  • max time kernel
    162s
  • max time network
    165s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27-03-2023 17:15

General

  • Target

    tmp.exe

  • Size

    605KB

  • MD5

    fae868e1e5cfc5b1ad62e21c2201893b

  • SHA1

    6469b546f298cdd2265902acfc1e57ac14177915

  • SHA256

    e88f33997f0017e4263bf7b7eff4bc6c15d8d9aa3357e9dd75af0ca80f945050

  • SHA512

    659b92bca49e8cfcef29aa6451748ceaa69165e01df8f96781d479dc9a96611718b0fc6839b1d03f794be8ccc579ebb82de52294d522a9f93a46a2f22e43a12c

  • SSDEEP

    12288:/YhX7MMHiMZ/D2cSLEGZuuXxHooRwfWz+ji/pD:/YhX7vCyD2f/yX+KjcpD

Malware Config

Extracted

Family

formbook

Campaign

poub

Decoy

WY0eksfISzRg4O6c+opnGL6gaw==

moRjn9ExtYi8UmUo+Tya

2vME+GedoxzFnuLXesUoVj4=

EvW4JWJ1NQ8nN3tA3SM=

2mK9efMZMgN1VOs=

8d0jua5b0J6AQEW7

/2cyThOd37DSTYMASDye4Q0t/Vs=

ral+tbIh2KKAQEW7

YLY9jsPtYB/FRmMo+Tya

R1WcElWAMtFxFrVqtZT2ZpIS9xRZNho=

KFXGg/T1pCC9GjrxUPTcjw==

8mMlK5nDwjjPFTP5jMtAtQ0t/Vs=

c7am8nhhlCo=

UW91trZj6dENxuRdpxOvW1Cf

sjOMUcvq6lYJCZEfV4euFzY=

62nBgPjdmWQkmWElww==

64E8JqA1aruSUvw=

NqI1reXpcR+REye0

8+y1oOsbjgSyEhjXUPTcjw==

Rx9by8gNBwN1VOs=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Xloader

    Xloader is a rebranded version of Formbook malware.

  • Xloader payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1772
      • C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe
        "C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe" "C:\Users\Admin\AppData\Local\Temp\iotriknymm.au3"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:1272
        • C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe
          "C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe"
          4⤵
          • Checks computer location settings
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3016
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4356
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe"
        3⤵
          PID:1572

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\iotriknymm.au3
      Filesize

      3KB

      MD5

      1adf412812f453fbff138af1ef1d14c6

      SHA1

      e6c95ede41fa9e226874be6093ed654d5fb7272d

      SHA256

      7bd7b67c3c47ee35aea15072f9a7caa8d3d866275f08b84bb3732a2bc53b36da

      SHA512

      b16216bbe7e3d7e426055115dc9cf06d7a5b409c1594b3bf2c97644bc0f440b3a79f691690129634263d4ec4f565ae895dfb8126cc41c5040ef5e4f402a6b1e1

    • C:\Users\Admin\AppData\Local\Temp\yiuxi.t
      Filesize

      50KB

      MD5

      eef5710a3ffe25919588c0344e4a24a7

      SHA1

      9e97eb93b36cb1cee4bcb71d17d035aada86812d

      SHA256

      cdcc51db7f0a4c644fcf97ec9c42bee82d1a6b617cf64ac12b55e559bff29f2e

      SHA512

      604c328432a030beb2d91023206c546577d8c243e77f0c747cd04808375417f84b13aeb254eae0bda1394207ca1291aa2313936d45abe660e8546942b30cbfaf

    • C:\Users\Admin\AppData\Local\Temp\ysoxzjueeaw.qgv
      Filesize

      196KB

      MD5

      4128c01597bb4f7bab1536acd9dab137

      SHA1

      e15d675cfd5caf081dd8cf18af516c8d4844e116

      SHA256

      84bc6477375743180c6b50e1550ee4747e817b66a498e0e47483802146d3e961

      SHA512

      72774b4dfa6f3eb7098d6eba99e91f21f8578d14e77f01daf0fe515b46b893c4bdfc5aded380dcc1491d83ed2a66d9315ec67dd44277ce0e80ff11057e5fb6e9

    • C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe
      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe
      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • C:\Users\Admin\AppData\Local\Temp\zkozagrkac.exe
      Filesize

      872KB

      MD5

      c56b5f0201a3b3de53e561fe76912bfd

      SHA1

      2a4062e10a5de813f5688221dbeb3f3ff33eb417

      SHA256

      237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

      SHA512

      195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

    • memory/748-163-0x0000000003280000-0x000000000335D000-memory.dmp
      Filesize

      884KB

    • memory/748-161-0x0000000003280000-0x000000000335D000-memory.dmp
      Filesize

      884KB

    • memory/748-160-0x0000000003280000-0x000000000335D000-memory.dmp
      Filesize

      884KB

    • memory/748-151-0x0000000008F20000-0x00000000090CC000-memory.dmp
      Filesize

      1.7MB

    • memory/1272-143-0x0000000000F50000-0x0000000000F52000-memory.dmp
      Filesize

      8KB

    • memory/3016-144-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/3016-149-0x0000000000400000-0x000000000042C000-memory.dmp
      Filesize

      176KB

    • memory/3016-150-0x0000000000F40000-0x0000000000F51000-memory.dmp
      Filesize

      68KB

    • memory/3016-148-0x00000000013B0000-0x00000000016FA000-memory.dmp
      Filesize

      3.3MB

    • memory/4356-152-0x0000000000EB0000-0x0000000000EB6000-memory.dmp
      Filesize

      24KB

    • memory/4356-153-0x0000000000EB0000-0x0000000000EB6000-memory.dmp
      Filesize

      24KB

    • memory/4356-155-0x0000000000E50000-0x0000000000E7C000-memory.dmp
      Filesize

      176KB

    • memory/4356-156-0x0000000002DC0000-0x000000000310A000-memory.dmp
      Filesize

      3.3MB

    • memory/4356-157-0x0000000000E50000-0x0000000000E7C000-memory.dmp
      Filesize

      176KB

    • memory/4356-159-0x0000000002C30000-0x0000000002CC0000-memory.dmp
      Filesize

      576KB