Analysis

  • max time kernel
    150s
  • max time network
    131s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    14-01-2021 20:05

General

  • Target

    PO101420.exe

  • Size

    837KB

  • MD5

    ff9de567dd3c2aa2ebcb5e0450964875

  • SHA1

    aeb352d5031fa9cd1f5a3e1a69c4c4740634956c

  • SHA256

    709b457160612a42a7714a517690760f05b09fb55f61570632500aa14328deec

  • SHA512

    b850406f9db839d5678997713034106c94c36d500f774ae222a086dcb9e693f450ba686f6ab13f6e9a07bf91e9aa92626a49e73a761d80c502c89f2ab3be279e

Malware Config

Extracted

Family

formbook

C2

http://www.hundsprobleme.com/fcxy/

Decoy

3dimex.com

heartgem.net

jhfctzdsna.club

lurapures.com

musclegirlfix.com

zebragenetics.com

evyneellis.com

jiaxiaozx.com

kayanmag.com

ufomars.com

liverepaire.com

hitspluz.com

regulargirlhair.com

lafleurdulis.com

secretsseniorengineersknow.com

zoerichards.photos

alphaappraisal.net

southernrussia.com

jbskatingmuseum.com

lawxorder.art

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3068
    • C:\Users\Admin\AppData\Local\Temp\PO101420.exe
      "C:\Users\Admin\AppData\Local\Temp\PO101420.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4040
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:932
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2828
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1516

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/932-11-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/932-12-0x000000000041ECE0-mapping.dmp
    • memory/1516-16-0x0000000000000000-mapping.dmp
    • memory/2828-17-0x0000000005A20000-0x0000000005B49000-memory.dmp
      Filesize

      1.2MB

    • memory/2828-15-0x0000000001040000-0x0000000001056000-memory.dmp
      Filesize

      88KB

    • memory/2828-14-0x0000000001040000-0x0000000001056000-memory.dmp
      Filesize

      88KB

    • memory/2828-13-0x0000000000000000-mapping.dmp
    • memory/4040-6-0x0000000004F20000-0x0000000004F21000-memory.dmp
      Filesize

      4KB

    • memory/4040-10-0x0000000007490000-0x0000000007491000-memory.dmp
      Filesize

      4KB

    • memory/4040-9-0x0000000007350000-0x00000000073DD000-memory.dmp
      Filesize

      564KB

    • memory/4040-8-0x0000000005190000-0x000000000519E000-memory.dmp
      Filesize

      56KB

    • memory/4040-7-0x0000000004F00000-0x0000000004F01000-memory.dmp
      Filesize

      4KB

    • memory/4040-2-0x00000000733D0000-0x0000000073ABE000-memory.dmp
      Filesize

      6.9MB

    • memory/4040-5-0x0000000005420000-0x0000000005421000-memory.dmp
      Filesize

      4KB

    • memory/4040-3-0x00000000005E0000-0x00000000005E1000-memory.dmp
      Filesize

      4KB