Analysis

  • max time kernel
    145s
  • max time network
    145s
  • platform
    windows10_x64
  • resource
    win10
  • submitted
    28-10-2020 07:50

General

  • Target

    New Order2922 & Inquiry.exe

  • Size

    325KB

  • MD5

    5af741e9c6b6cdb708a61026db90e451

  • SHA1

    28f970bffc61d21ba560d24f7b944383b72b5bb9

  • SHA256

    eb4e7cd83e6986a52a3ad673a6994c6e917dd6bc70adfbccdf2c1a5348b72a0b

  • SHA512

    91ac168add92a3717cef7db22f810d4ab67e56570303e8f7f66a3e4f20f3afdca4150c282166ecb8d0ebaeac6c9cc5df09a897e5883184e7ce2ce5248cb49d18

Malware Config

Extracted

Family

formbook

C2

http://www.mahallagate.com/g09b/

Decoy

poultryconservancy.com

theafterdarkcafe.com

falkenranger.com

sahafideccan.com

domlikevista.com

kensbackhoeservice.com

helpmefindaplan.com

feedbackcounselling.com

brandbrights.com

guiefer.com

sharkwithdraw.com

iamfeelingmyself.com

hauteandcood.com

phoenixnewhomesales.com

floratend.com

multipanelyaceros.com

yuceyasi.com

cqweihz.com

sitiobemviver.com

meugovapp.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 13 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 71 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 16 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\New Order2922 & Inquiry.exe
      "C:\Users\Admin\AppData\Local\Temp\New Order2922 & Inquiry.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Windows\SysWOW64\timeout.exe
        timeout
        3⤵
        • Delays execution with timeout.exe
        PID:816
      • C:\Users\Admin\AppData\Local\Temp\New Order2922 & Inquiry.exe
        "C:\Users\Admin\AppData\Local\Temp\New Order2922 & Inquiry.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 1748
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2900
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:4060
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:2060
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:2196
          • C:\Windows\SysWOW64\ipconfig.exe
            "C:\Windows\SysWOW64\ipconfig.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Gathers network information
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3964
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Users\Admin\AppData\Local\Temp\New Order2922 & Inquiry.exe"
              3⤵
                PID:3904

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/816-5-0x0000000000000000-mapping.dmp

          • memory/1360-0-0x00000000732F0000-0x00000000739DE000-memory.dmp

            Filesize

            6.9MB

          • memory/1360-1-0x0000000000ED0000-0x0000000000ED1000-memory.dmp

            Filesize

            4KB

          • memory/1360-3-0x0000000005700000-0x0000000005701000-memory.dmp

            Filesize

            4KB

          • memory/1360-4-0x00000000058E0000-0x00000000058E1000-memory.dmp

            Filesize

            4KB

          • memory/1360-6-0x0000000007790000-0x000000000783C000-memory.dmp

            Filesize

            688KB

          • memory/1360-7-0x0000000005200000-0x0000000005201000-memory.dmp

            Filesize

            4KB

          • memory/1360-8-0x000000000C440000-0x000000000C441000-memory.dmp

            Filesize

            4KB

          • memory/2332-9-0x0000000000400000-0x000000000045E000-memory.dmp

            Filesize

            376KB

          • memory/2332-10-0x000000000041ED30-mapping.dmp

          • memory/2900-11-0x0000000004FD0000-0x0000000004FD1000-memory.dmp

            Filesize

            4KB

          • memory/2900-12-0x0000000005710000-0x0000000005711000-memory.dmp

            Filesize

            4KB

          • memory/3904-25-0x0000000000000000-mapping.dmp

          • memory/3964-22-0x0000000000000000-mapping.dmp

          • memory/3964-23-0x00000000008E0000-0x00000000008EB000-memory.dmp

            Filesize

            44KB

          • memory/3964-24-0x00000000008E0000-0x00000000008EB000-memory.dmp

            Filesize

            44KB

          • memory/3964-26-0x0000000003CB0000-0x0000000003E41000-memory.dmp

            Filesize

            1.6MB