Analysis

  • max time kernel
    151s
  • max time network
    92s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    14-01-2021 20:05

General

  • Target

    PO101420.exe

  • Size

    837KB

  • MD5

    ff9de567dd3c2aa2ebcb5e0450964875

  • SHA1

    aeb352d5031fa9cd1f5a3e1a69c4c4740634956c

  • SHA256

    709b457160612a42a7714a517690760f05b09fb55f61570632500aa14328deec

  • SHA512

    b850406f9db839d5678997713034106c94c36d500f774ae222a086dcb9e693f450ba686f6ab13f6e9a07bf91e9aa92626a49e73a761d80c502c89f2ab3be279e

Malware Config

Extracted

Family

formbook

C2

http://www.hundsprobleme.com/fcxy/

Decoy

3dimex.com

heartgem.net

jhfctzdsna.club

lurapures.com

musclegirlfix.com

zebragenetics.com

evyneellis.com

jiaxiaozx.com

kayanmag.com

ufomars.com

liverepaire.com

hitspluz.com

regulargirlhair.com

lafleurdulis.com

secretsseniorengineersknow.com

zoerichards.photos

alphaappraisal.net

southernrussia.com

jbskatingmuseum.com

lawxorder.art

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\PO101420.exe
      "C:\Users\Admin\AppData\Local\Temp\PO101420.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:304
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:968
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:268

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/268-11-0x0000000000000000-mapping.dmp
    • memory/304-7-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/304-8-0x000000000041ECE0-mapping.dmp
    • memory/968-9-0x0000000000000000-mapping.dmp
    • memory/968-10-0x0000000000930000-0x000000000093A000-memory.dmp
      Filesize

      40KB

    • memory/968-12-0x00000000030F0000-0x0000000003254000-memory.dmp
      Filesize

      1.4MB

    • memory/1080-2-0x0000000074CF0000-0x00000000753DE000-memory.dmp
      Filesize

      6.9MB

    • memory/1080-3-0x0000000000D70000-0x0000000000D71000-memory.dmp
      Filesize

      4KB

    • memory/1080-5-0x0000000000480000-0x000000000048E000-memory.dmp
      Filesize

      56KB

    • memory/1080-6-0x00000000058C0000-0x000000000594D000-memory.dmp
      Filesize

      564KB