Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    23-02-2021 13:23

General

  • Target

    1fuKoR0haiNZQZy.exe

  • Size

    491KB

  • MD5

    cd93fbbaa838564b7cd7cfae170713b0

  • SHA1

    d0d38719d7e8b68d320a8d78eada9c7cd66f296c

  • SHA256

    38eca2a25088bfa832212231f4c7c600a2dd215931824c55cb15e7478f7c8c15

  • SHA512

    422950d397132986e8d1e759a37103cac3df8757f0bb0c284a5a65fae11bbce57c99c8a7c888e22fc88c3511998f8b963278d494dba728b7213b7f8fee6cdc11

Malware Config

Extracted

Family

formbook

C2

http://www.ncessity.com/awib/

Decoy

afrotl.com

highlandterracehome.com

bucklebelt.site

pipematch.com

babybkids.com

karpoforo.com

actforsea.com

kikizubrecords.com

mydibit.com

kdot.design

gerritsmontage.com

hurawn.com

judithtidwell.com

zoaies.com

ssboatzul.com

elevictory.com

data-4gviettel.club

znfyoug.icu

warnermusic.group

jxkuljhc.icu

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3128
    • C:\Users\Admin\AppData\Local\Temp\1fuKoR0haiNZQZy.exe
      "C:\Users\Admin\AppData\Local\Temp\1fuKoR0haiNZQZy.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4688
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\kNBjsouyZBQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmpC2D4.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:3384
      • C:\Users\Admin\AppData\Local\Temp\1fuKoR0haiNZQZy.exe
        "C:\Users\Admin\AppData\Local\Temp\1fuKoR0haiNZQZy.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4088
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4300
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\1fuKoR0haiNZQZy.exe"
        3⤵
          PID:4420

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpC2D4.tmp

      MD5

      92ea875f155ab3aaad6a5a9389e0a3f9

      SHA1

      6d0da33f1d82a8cc726e435c138cc3cbd4e7bfdc

      SHA256

      60e996bd27408b220b44f374eb2fa076055bf7970c4a9de9745890274b96c30a

      SHA512

      8ee43842ceaf326471a7aa73d0b70b6a18b0ba4538112aac44c734e12ed33f28d605799223e7708dfabde3728dc72427a343211f00378ca7ec6340465296f441

    • memory/3128-20-0x0000000000AF0000-0x0000000000C2F000-memory.dmp

      Filesize

      1.2MB

    • memory/3128-29-0x0000000005F30000-0x0000000006054000-memory.dmp

      Filesize

      1.1MB

    • memory/3384-13-0x0000000000000000-mapping.dmp

    • memory/4088-15-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/4088-16-0x000000000041ECE0-mapping.dmp

    • memory/4088-19-0x0000000001190000-0x00000000011A4000-memory.dmp

      Filesize

      80KB

    • memory/4088-18-0x00000000011B0000-0x00000000014D0000-memory.dmp

      Filesize

      3.1MB

    • memory/4300-25-0x0000000003320000-0x0000000003640000-memory.dmp

      Filesize

      3.1MB

    • memory/4300-21-0x0000000000000000-mapping.dmp

    • memory/4300-24-0x0000000000940000-0x000000000096E000-memory.dmp

      Filesize

      184KB

    • memory/4300-23-0x0000000000BB0000-0x0000000000BC7000-memory.dmp

      Filesize

      92KB

    • memory/4300-28-0x00000000030E0000-0x0000000003173000-memory.dmp

      Filesize

      588KB

    • memory/4420-22-0x0000000000000000-mapping.dmp

    • memory/4688-12-0x0000000001430000-0x0000000001485000-memory.dmp

      Filesize

      340KB

    • memory/4688-11-0x0000000005760000-0x0000000005763000-memory.dmp

      Filesize

      12KB

    • memory/4688-10-0x00000000056E0000-0x00000000056E1000-memory.dmp

      Filesize

      4KB

    • memory/4688-9-0x0000000005410000-0x0000000005411000-memory.dmp

      Filesize

      4KB

    • memory/4688-2-0x0000000073900000-0x0000000073FEE000-memory.dmp

      Filesize

      6.9MB

    • memory/4688-8-0x0000000005610000-0x0000000005611000-memory.dmp

      Filesize

      4KB

    • memory/4688-7-0x00000000054D0000-0x00000000054D1000-memory.dmp

      Filesize

      4KB

    • memory/4688-6-0x0000000005930000-0x0000000005931000-memory.dmp

      Filesize

      4KB

    • memory/4688-5-0x0000000005340000-0x0000000005341000-memory.dmp

      Filesize

      4KB

    • memory/4688-3-0x00000000009B0000-0x00000000009B1000-memory.dmp

      Filesize

      4KB