Analysis

  • max time kernel
    100s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-01-2021 17:55

General

  • Target

    IRS_Covid-19_Relief_Payment_Notice_pdf.exe

  • Size

    84KB

  • MD5

    5525bb8a978d3ac15812c8d8ca9b8a57

  • SHA1

    dcb9549ff9c290e056f83639ad546b03206a0806

  • SHA256

    21f49ea6e105c22882a9fb0065803deee18eddb76767a30ddade2e2725eb65d9

  • SHA512

    0e5504ee2fc22ce87c1cac663e0c4cd76227025da20c2903d63ddafc0fc8a270d56a90b89c31d8ee448a61f881ace27037beb623f4409b9d1020a6b2a0a9f35b

Malware Config

Extracted

Family

formbook

C2

http://www.greatamericapolling.com/71m/

Decoy

heartprintclub.com

artstudio888.com

a2zitsol.com

azarblock.com

designwithravi.com

twoforksbakery.com

fundacionsinlimiteips.com

alephconference.site

smallpeo.com

ingpatrimoine.com

smartpancake.icu

sakiaza.com

hamptoninnbelton.com

captainamericashirts.com

belvederepublishing.com

trollingguide.com

sfgproposal.com

themindofafunnygirl.com

mishkatelm.com

biodis.cloud

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\IRS_Covid-19_Relief_Payment_Notice_pdf.exe
    "C:\Users\Admin\AppData\Local\Temp\IRS_Covid-19_Relief_Payment_Notice_pdf.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:972
    • C:\Users\Admin\AppData\Local\Temp\IRS_Covid-19_Relief_Payment_Notice_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\IRS_Covid-19_Relief_Payment_Notice_pdf.exe"
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2724

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Install Root Certificate

1
T1130

Modify Registry

1
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/972-4-0x0000000004AF0000-0x0000000004AFE000-memory.dmp
    Filesize

    56KB

  • memory/2724-5-0x0000000000401498-mapping.dmp
  • memory/2724-6-0x0000000000401000-0x00000000004FD000-memory.dmp
    Filesize

    1008KB

  • memory/2724-7-0x0000000000560000-0x0000000000660000-memory.dmp
    Filesize

    1024KB

  • memory/2724-8-0x0000000000401000-0x0000000000541000-memory.dmp
    Filesize

    1.2MB

  • memory/2724-9-0x000000001E840000-0x000000001EB60000-memory.dmp
    Filesize

    3.1MB