Analysis

  • max time kernel
    146s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    13-01-2021 02:02

General

  • Target

    Project Review_pdf.exe

  • Size

    913KB

  • MD5

    508b7bca5b55eba939827fa59d25195c

  • SHA1

    991fae86b65d9ae32f267d53c05d3b24248bd1ac

  • SHA256

    28aad79081b924ce33128b96953771392acdd3881c2b21db53d1a0f8de83ec5b

  • SHA512

    afbcad2c554c15b272b1ff5b4156f9bf360556d0faab9c4e4760195a8efd86b6942b0f6259df45e14932b812227cbaa74d1adc76f2c5c3765d038cf28d891958

Malware Config

Extracted

Family

formbook

C2

http://www.workonlinetimallen.com/dll/

Decoy

nyeconcreations.com

generar-k.com

refugiodelmate.com

elementclubhouse.com

freescorrs.xyz

tonesweettone.com

lojachicco.com

cyberxchange.net

strobelsolutions.com

tipsytravelerbar.com

shesheofnewyork.com

jdallmed.com

woefys.online

naviwatch.net

yuelvzuche.com

thehoneysuppliers.site

smokindeebflavors.com

preventvaccins.com

thepraisehouse.com

lgbtpridedirectory.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1744
      • C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe"
        3⤵
          PID:1080
        • C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe
          "C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:432
      • C:\Windows\SysWOW64\NETSTAT.EXE
        "C:\Windows\SysWOW64\NETSTAT.EXE"
        2⤵
        • Suspicious use of SetThreadContext
        • Gathers network information
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Project Review_pdf.exe"
          3⤵
          • Deletes itself
          PID:552

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/432-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/432-8-0x000000000041EBD0-mapping.dmp
    • memory/552-11-0x0000000000000000-mapping.dmp
    • memory/1504-9-0x0000000000000000-mapping.dmp
    • memory/1504-10-0x00000000004C0000-0x00000000004C9000-memory.dmp
      Filesize

      36KB

    • memory/1504-12-0x00000000020B0000-0x0000000002240000-memory.dmp
      Filesize

      1.6MB

    • memory/1744-2-0x00000000741A0000-0x000000007488E000-memory.dmp
      Filesize

      6.9MB

    • memory/1744-3-0x0000000000830000-0x0000000000831000-memory.dmp
      Filesize

      4KB

    • memory/1744-5-0x0000000000210000-0x0000000000222000-memory.dmp
      Filesize

      72KB

    • memory/1744-6-0x0000000005400000-0x000000000546B000-memory.dmp
      Filesize

      428KB