Analysis

  • max time kernel
    37s
  • max time network
    119s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-01-2021 07:18

General

  • Target

    4ff22921bc0d07d7566d986e84afc348.exe

  • Size

    1.0MB

  • MD5

    4ff22921bc0d07d7566d986e84afc348

  • SHA1

    77fbc178ba4fdcad7c50fd27be99a42819229295

  • SHA256

    db22f0cb9581f21a73f9221cb57c49b5e4f698021754eaa30fdbde8db72ad333

  • SHA512

    b928e6358b18b64b3595984e9b7bf47e4c6660803dca44b23270eaadacef6183e234f3bbfe180e48a1565c16fced99fac254a9b13d4ea32c8a16f406c7e463fe

Malware Config

Extracted

Family

formbook

C2

http://www.zglvyouzaixian.com/nki/

Decoy

igo-digiworld.com

infrahiit.com

herhealingwater.com

inspiredbytradition.com

onlinepropertyworld.com

rvwdj.com

mudahbikinsuhi.online

multipleofferonline.com

striveyouthministry.com

affectiveneuro.net

f21m.com

perfumefashion.icu

instantcash4rvs.com

help-verifiedbadge.com

solomonislandsblog.com

vipshoppingwizard.com

doggybargains.com

fjyaoxi.net

luxpropertyandassociates.com

companyfinders.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4ff22921bc0d07d7566d986e84afc348.exe
    "C:\Users\Admin\AppData\Local\Temp\4ff22921bc0d07d7566d986e84afc348.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4776
    • C:\Users\Admin\AppData\Local\Temp\4ff22921bc0d07d7566d986e84afc348.exe
      "{path}"
      2⤵
        PID:1896
      • C:\Users\Admin\AppData\Local\Temp\4ff22921bc0d07d7566d986e84afc348.exe
        "{path}"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:4432

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/4432-11-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/4432-12-0x000000000041EB70-mapping.dmp
    • memory/4776-2-0x0000000073370000-0x0000000073A5E000-memory.dmp
      Filesize

      6.9MB

    • memory/4776-3-0x0000000000040000-0x0000000000041000-memory.dmp
      Filesize

      4KB

    • memory/4776-5-0x00000000073A0000-0x00000000073A1000-memory.dmp
      Filesize

      4KB

    • memory/4776-6-0x0000000006F40000-0x0000000006F41000-memory.dmp
      Filesize

      4KB

    • memory/4776-7-0x00000000026A0000-0x00000000026A1000-memory.dmp
      Filesize

      4KB

    • memory/4776-8-0x00000000070A0000-0x00000000070AE000-memory.dmp
      Filesize

      56KB

    • memory/4776-9-0x00000000023C0000-0x0000000002441000-memory.dmp
      Filesize

      516KB

    • memory/4776-10-0x0000000009400000-0x0000000009401000-memory.dmp
      Filesize

      4KB