Analysis

  • max time kernel
    148s
  • max time network
    12s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    08-04-2021 06:53

General

  • Target

    NEW ORDER ELO-05756485.exe

  • Size

    528KB

  • MD5

    ef847f9fc2339b9470150fef1105b5fe

  • SHA1

    eb9b2c97525c2b167d1ae4bdeba308f1c4d9206d

  • SHA256

    9e54241184e45b1950037313896e0d2e864cc9d373f5a2f14b0af405094fd1a4

  • SHA512

    ea26bb55d9d79ca887b184b71746328e65b06b24d701d7856f6f416a1fc93f750580b68a8204b30eb94dabc9e899e4baf4358f23ef5ce7ea23308369b5be4c10

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.dingolope.com/riai/

Decoy

856380892.xyz

goproteinz.com

girigratis.com

4schwuleautoren.com

artofwrestlingicons.com

miles4moms.com

tamiigun.com

noritamoneyconsultants.net

blacklionllc.net

elevictory.com

happinessmail.com

thymocide.net

123goimmo.com

advocate4deaf.com

lovelyforum.net

rentlondonapartment.com

weinsureplanes.com

tagfqjxf.icu

thewellbeingsutra.com

enibo-official.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe
      "C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1932
      • C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe
        "C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:400
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:924
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER ELO-05756485.exe"
          3⤵
          • Deletes itself
          PID:988

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/400-16-0x0000000000260000-0x0000000000274000-memory.dmp
      Filesize

      80KB

    • memory/400-11-0x000000000041ED30-mapping.dmp
    • memory/400-10-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/400-13-0x0000000000810000-0x0000000000B13000-memory.dmp
      Filesize

      3.0MB

    • memory/400-15-0x0000000000220000-0x0000000000234000-memory.dmp
      Filesize

      80KB

    • memory/624-24-0x0000000000A80000-0x0000000000B13000-memory.dmp
      Filesize

      588KB

    • memory/624-23-0x0000000002310000-0x0000000002613000-memory.dmp
      Filesize

      3.0MB

    • memory/624-22-0x0000000000110000-0x000000000013E000-memory.dmp
      Filesize

      184KB

    • memory/624-21-0x0000000000F00000-0x0000000000F0E000-memory.dmp
      Filesize

      56KB

    • memory/624-19-0x00000000750C1000-0x00000000750C3000-memory.dmp
      Filesize

      8KB

    • memory/624-18-0x0000000000000000-mapping.dmp
    • memory/988-20-0x0000000000000000-mapping.dmp
    • memory/1260-14-0x00000000074A0000-0x000000000764D000-memory.dmp
      Filesize

      1.7MB

    • memory/1260-17-0x0000000007650000-0x000000000779F000-memory.dmp
      Filesize

      1.3MB

    • memory/1932-2-0x0000000073E00000-0x00000000744EE000-memory.dmp
      Filesize

      6.9MB

    • memory/1932-9-0x0000000000750000-0x0000000000783000-memory.dmp
      Filesize

      204KB

    • memory/1932-8-0x0000000005340000-0x00000000053B5000-memory.dmp
      Filesize

      468KB

    • memory/1932-7-0x000000007EF40000-0x000000007EF41000-memory.dmp
      Filesize

      4KB

    • memory/1932-6-0x0000000000490000-0x0000000000494000-memory.dmp
      Filesize

      16KB

    • memory/1932-5-0x00000000004A0000-0x00000000004A1000-memory.dmp
      Filesize

      4KB

    • memory/1932-3-0x00000000013A0000-0x00000000013A1000-memory.dmp
      Filesize

      4KB