Analysis

  • max time kernel
    151s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    12-01-2021 07:24

General

  • Target

    SCAN_20210112140930669.exe

  • Size

    837KB

  • MD5

    0d7f35bd5d0a8f5e0b52db592ab5509c

  • SHA1

    5300466a9a3ca11e3f90785ed8a13115e200def6

  • SHA256

    f49e50532a7e5d312f8429c41e28848461651f671139a7590b64d9df029db998

  • SHA512

    978f2d13f77d724a780fe33a5740b1735d95b03dae0e6a273cbf1101d13c8e3c7981b219433975ff42db7f97488b1868aa990d660713f702568e411ffc9b00f3

Malware Config

Extracted

Family

formbook

C2

http://www.midnightblueinc.com/2kf/

Decoy

edmondscakes.com

doublewldr.online

tickets2usa.com

heyhxry.com

weightloss-gulfport.com

prosselius.com

newviewroofers.com

jacksonarearealestate.com

catparkas.xyz

pagos2020.com

sonwsefjrahi.online

franchisethings.com

nuocvietngaynay.com

sohelvai.com

mikeyroush.com

lamesaroofing.com

betbigo138.com

amazon-service-recovery.com

clockin.net

riostrader.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\SCAN_20210112140930669.exe
      "C:\Users\Admin\AppData\Local\Temp\SCAN_20210112140930669.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:540
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TOYAehanY" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5B11.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1404
      • C:\Users\Admin\AppData\Local\Temp\SCAN_20210112140930669.exe
        "C:\Users\Admin\AppData\Local\Temp\SCAN_20210112140930669.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2692
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1324
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1304
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\SCAN_20210112140930669.exe"
          3⤵
            PID:2192

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp5B11.tmp
        MD5

        3951a19122ca11d41bfbafd0749e76bb

        SHA1

        cb8d290688e3c2ebd90bc5eaef5c1267029285c3

        SHA256

        dfed047e8505d0b25d1606217b9a898777381ccd0d1f9cf00ca79271a0fbc791

        SHA512

        88675298aa03bcbfc5f3b8d5cb35d4bcc323849172b3fb3ef6b2ad14dfa2d78f9d5ab6390d0fcbcaa99e827dc806a6d76157f8c3ce2d50f126479809ceeff6fe

      • memory/540-11-0x0000000005F40000-0x0000000005FAC000-memory.dmp
        Filesize

        432KB

      • memory/540-6-0x00000000056D0000-0x00000000056D1000-memory.dmp
        Filesize

        4KB

      • memory/540-7-0x00000000051D0000-0x00000000051D1000-memory.dmp
        Filesize

        4KB

      • memory/540-2-0x0000000073520000-0x0000000073C0E000-memory.dmp
        Filesize

        6.9MB

      • memory/540-9-0x00000000053E0000-0x00000000053E1000-memory.dmp
        Filesize

        4KB

      • memory/540-5-0x0000000005130000-0x0000000005131000-memory.dmp
        Filesize

        4KB

      • memory/540-10-0x0000000005530000-0x0000000005542000-memory.dmp
        Filesize

        72KB

      • memory/540-8-0x00000000050E0000-0x00000000050E1000-memory.dmp
        Filesize

        4KB

      • memory/540-3-0x0000000000800000-0x0000000000801000-memory.dmp
        Filesize

        4KB

      • memory/1304-16-0x0000000000000000-mapping.dmp
      • memory/1304-18-0x00000000009C0000-0x00000000009D3000-memory.dmp
        Filesize

        76KB

      • memory/1304-17-0x00000000009C0000-0x00000000009D3000-memory.dmp
        Filesize

        76KB

      • memory/1404-12-0x0000000000000000-mapping.dmp
      • memory/2192-19-0x0000000000000000-mapping.dmp
      • memory/2692-15-0x000000000041EB30-mapping.dmp
      • memory/2692-14-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB