Analysis

  • max time kernel
    149s
  • max time network
    11s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    26-02-2021 16:12

General

  • Target

    CONT NO DFSU125310 products list.exe

  • Size

    1.0MB

  • MD5

    5a92c96663ac34dd87d73e789c27f610

  • SHA1

    46e21943df04f53eb175007c4bff3040619ae50b

  • SHA256

    9f38ade8e53d28eef33a81e0559b92b44fa878ae9b61fadd3bb245d33486e2c0

  • SHA512

    1bfb7176c5e9eeb2103a36760137fbe773d8b3170842e8e1e92a3b4629b140f93b4804a0198732a71924e0f4514325575310986e8b41805f860f844d01f1ca8a

Malware Config

Extracted

Family

formbook

C2

http://www.discorddeno.land/suod/

Decoy

casirivimab.info

johnvogia.com

lzdafang.com

tarihmarketi.com

singalongpress.com

three60farms.com

websky.pro

jacketsmecca.com

magentos6.com

brooksideseniorapts.com

onewhistleandflags.com

naturopathe-valdoise-france.com

reflexmem.com

kurumsalpanel.com

bhuwarecruitment.com

exponentialhealth.online

posttensionrepairs.com

prbrokerllc.com

aashealthcarestaffing.com

pubgeventcenter.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\CONT NO DFSU125310 products list.exe
      "C:\Users\Admin\AppData\Local\Temp\CONT NO DFSU125310 products list.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Users\Admin\AppData\Local\Temp\CONT NO DFSU125310 products list.exe
        "C:\Users\Admin\AppData\Local\Temp\CONT NO DFSU125310 products list.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1500
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:476
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\CONT NO DFSU125310 products list.exe"
        3⤵
        • Deletes itself
        PID:1304

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/476-20-0x00000000023C0000-0x0000000002453000-memory.dmp

    Filesize

    588KB

  • memory/476-19-0x0000000002010000-0x0000000002313000-memory.dmp

    Filesize

    3.0MB

  • memory/476-18-0x0000000000100000-0x000000000012E000-memory.dmp

    Filesize

    184KB

  • memory/476-17-0x0000000000830000-0x0000000000934000-memory.dmp

    Filesize

    1.0MB

  • memory/476-14-0x0000000000000000-mapping.dmp

  • memory/476-15-0x00000000760D1000-0x00000000760D3000-memory.dmp

    Filesize

    8KB

  • memory/1108-2-0x0000000073E00000-0x00000000744EE000-memory.dmp

    Filesize

    6.9MB

  • memory/1108-3-0x0000000000AA0000-0x0000000000AA1000-memory.dmp

    Filesize

    4KB

  • memory/1108-5-0x0000000000560000-0x0000000000563000-memory.dmp

    Filesize

    12KB

  • memory/1108-6-0x00000000020E0000-0x00000000020E1000-memory.dmp

    Filesize

    4KB

  • memory/1108-7-0x0000000004D20000-0x0000000004D74000-memory.dmp

    Filesize

    336KB

  • memory/1264-13-0x0000000006880000-0x00000000069AD000-memory.dmp

    Filesize

    1.2MB

  • memory/1304-16-0x0000000000000000-mapping.dmp

  • memory/1500-11-0x0000000000D40000-0x0000000001043000-memory.dmp

    Filesize

    3.0MB

  • memory/1500-12-0x00000000001E0000-0x00000000001F4000-memory.dmp

    Filesize

    80KB

  • memory/1500-9-0x000000000041ED90-mapping.dmp

  • memory/1500-8-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB