Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 07:54

General

  • Target

    PO-23562#TZ232.exe

  • Size

    1.5MB

  • MD5

    357a14cfd77aeee6ccdefd6306790b6e

  • SHA1

    515e8f43b3261329f2da96a7f0e873061c33cbd8

  • SHA256

    cb2e173430a404a7cf52a54db1ff96b0de6eed1b8953d96b57e2780e45e71db9

  • SHA512

    dafb6a5de58bf0a42b378c6e83271e55d28204cf1255fa702b1b312d9b6b31c68315241db9089a4ee09445c202baea1bcf51a33ce6132513bff0331c21d48682

Malware Config

Extracted

Family

formbook

C2

http://www.styrelseforum.com/p95n/

Decoy

kimberlyrutledge.com

auctus.agency

johnemotions.com

guilt-brilliant.com

wxshangdian.com

theolivetreeonline.com

stellarfranchisebrands.com

every1no1.com

hoangthanhgroup.com

psm-gen.com

kingdomwow.com

digitalksr.com

karynpolitoforlg.com

youthdaycalgary.com

libertyhandymanservicesllc.com

breatheohio.com

allenleather.com

transformafter50.info

hnhsylsb.com

hmtradebd.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 55 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2784
    • C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:984
      • C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe
        "{path}"
        3⤵
          PID:2840
        • C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe
          "{path}"
          3⤵
            PID:3840
          • C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe
            "{path}"
            3⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1468
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:2988
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:1476
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:1060
              • C:\Windows\SysWOW64\explorer.exe
                "C:\Windows\SysWOW64\explorer.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:524
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Users\Admin\AppData\Local\Temp\PO-23562#TZ232.exe"
                  3⤵
                    PID:2148

              Network

              MITRE ATT&CK Matrix

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/524-19-0x0000000000000000-mapping.dmp
              • memory/524-24-0x0000000004BD0000-0x0000000004C63000-memory.dmp
                Filesize

                588KB

              • memory/524-23-0x0000000004810000-0x0000000004B30000-memory.dmp
                Filesize

                3.1MB

              • memory/524-20-0x0000000000B20000-0x0000000000F5F000-memory.dmp
                Filesize

                4.2MB

              • memory/524-21-0x0000000003260000-0x000000000328E000-memory.dmp
                Filesize

                184KB

              • memory/984-8-0x000000000A860000-0x000000000A861000-memory.dmp
                Filesize

                4KB

              • memory/984-2-0x0000000073800000-0x0000000073EEE000-memory.dmp
                Filesize

                6.9MB

              • memory/984-10-0x00000000029E0000-0x00000000029E1000-memory.dmp
                Filesize

                4KB

              • memory/984-11-0x000000000C4F0000-0x000000000C549000-memory.dmp
                Filesize

                356KB

              • memory/984-12-0x000000000C5F0000-0x000000000C5F1000-memory.dmp
                Filesize

                4KB

              • memory/984-9-0x000000000AAF0000-0x000000000AAFE000-memory.dmp
                Filesize

                56KB

              • memory/984-6-0x000000000ACC0000-0x000000000ACC1000-memory.dmp
                Filesize

                4KB

              • memory/984-7-0x000000000A8A0000-0x000000000A8A1000-memory.dmp
                Filesize

                4KB

              • memory/984-5-0x0000000002940000-0x00000000029BC000-memory.dmp
                Filesize

                496KB

              • memory/984-3-0x0000000000560000-0x0000000000561000-memory.dmp
                Filesize

                4KB

              • memory/1468-16-0x00000000012F0000-0x0000000001610000-memory.dmp
                Filesize

                3.1MB

              • memory/1468-17-0x0000000000E20000-0x0000000000E34000-memory.dmp
                Filesize

                80KB

              • memory/1468-14-0x000000000041EDF0-mapping.dmp
              • memory/1468-13-0x0000000000400000-0x000000000042E000-memory.dmp
                Filesize

                184KB

              • memory/2148-22-0x0000000000000000-mapping.dmp
              • memory/2784-18-0x0000000005820000-0x000000000597F000-memory.dmp
                Filesize

                1.4MB

              • memory/2784-25-0x0000000003040000-0x0000000003122000-memory.dmp
                Filesize

                904KB