Analysis

  • max time kernel
    147s
  • max time network
    134s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    19-04-2021 10:29

General

  • Target

    6.exe

  • Size

    906KB

  • MD5

    69802992de34a4988baf0045a2d1dccf

  • SHA1

    5a568d6d7a56a1f1bd81a6dd5a7487a7b7b6dff3

  • SHA256

    de9d32e10118cdc282e1e20d42c53c061f0d9c727c88af95f8d9059ea163e2f6

  • SHA512

    a1a5e73f86ab933256a3689c1ad06f17534a06ac0cc8446a5e23c462e787d56b9887399660823ebfed7b0069745624e48a8acd1575e98efcb273dbe006dfe202

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.info/n7ak/

Decoy

audereventur.com

huro14.com

wwwjinsha155.com

antiquevendor.com

samuraisoulfood.net

traffic4updates.download

hypersarv.com

rapport-happy-wedding.com

rokutechnosupport.online

allworljob.com

hanaleedossmann.com

kauai-marathon.com

bepbosch.com

kangen-international.com

zoneshopemenowz.com

belviderewrestling.com

ipllink.com

sellingforcreators.com

wwwswty6655.com

qtumboa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 3 IoCs
  • Modifies registry class 38 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Drops file in Program Files directory
    • Modifies Internet Explorer settings
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Users\Admin\AppData\Local\Temp\6.exe
      "C:\Users\Admin\AppData\Local\Temp\6.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1048
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:772
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\DpiScaling.exe"
        3⤵
          PID:548
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1052
        • C:\Program Files (x86)\M-zod408\updatepdd.exe
          "C:\Program Files (x86)\M-zod408\updatepdd.exe"
          2⤵
          • Executes dropped EXE
          PID:1364
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{06622D85-6856-4460-8DE1-A81921B41C4B}
        1⤵
          PID:2032

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Execution

        Command-Line Interface

        1
        T1059

        Persistence

        Registry Run Keys / Startup Folder

        1
        T1060

        Defense Evasion

        Modify Registry

        2
        T1112

        Discovery

        System Information Discovery

        1
        T1082

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\M-zod408\updatepdd.exe
          MD5

          8c9da2e414e713d3daff1f18223ae11b

          SHA1

          9ef90d73fa4d852be9b803a5e990cc908aab8a94

          SHA256

          60b2a9d679f14f92e284ad21395da53652db137e45ec6473d9033e6c3fe6a37f

          SHA512

          adc712d94e8226729b336a348e9376d68f1e006871e7a0151f312e125e96226e74bc75e87efd709e31c5cb322a9ed68e2912c9fd03bd6e6800f5900f712105d7

        • C:\Program Files (x86)\M-zod408\updatepdd.exe
          MD5

          8c9da2e414e713d3daff1f18223ae11b

          SHA1

          9ef90d73fa4d852be9b803a5e990cc908aab8a94

          SHA256

          60b2a9d679f14f92e284ad21395da53652db137e45ec6473d9033e6c3fe6a37f

          SHA512

          adc712d94e8226729b336a348e9376d68f1e006871e7a0151f312e125e96226e74bc75e87efd709e31c5cb322a9ed68e2912c9fd03bd6e6800f5900f712105d7

        • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologim.jpeg
          MD5

          d3528306af7bc3e13ab6b2ba3ff303da

          SHA1

          3b27b859c0f429b2f7c06725cd3d9bb17a8a5d2f

          SHA256

          f0484a66f983b6a34c8d5765df5c337e92d0e8e9a6d50987c0c464d3f74723d8

          SHA512

          b2dec11c6b89c5d2a3884c236a7acd23b439a9d090cdc40991c189fd3da112bf71d886c61791f466130491b1c3b75be0ecd10ae5e33f9c5bfddac1705ebe61c9

        • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrf.ini
          MD5

          2f245469795b865bdd1b956c23d7893d

          SHA1

          6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

          SHA256

          1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

          SHA512

          909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

        • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologri.ini
          MD5

          d63a82e5d81e02e399090af26db0b9cb

          SHA1

          91d0014c8f54743bba141fd60c9d963f869d76c9

          SHA256

          eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

          SHA512

          38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

        • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrv.ini
          MD5

          ba3b6bc807d4f76794c4b81b09bb9ba5

          SHA1

          24cb89501f0212ff3095ecc0aba97dd563718fb1

          SHA256

          6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

          SHA512

          ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

        • memory/548-75-0x0000000000000000-mapping.dmp
        • memory/772-65-0x0000000000000000-mapping.dmp
        • memory/772-67-0x0000000000090000-0x0000000000091000-memory.dmp
          Filesize

          4KB

        • memory/772-70-0x0000000000220000-0x0000000000234000-memory.dmp
          Filesize

          80KB

        • memory/772-69-0x00000000020A0000-0x00000000023A3000-memory.dmp
          Filesize

          3.0MB

        • memory/772-68-0x0000000010410000-0x000000001043D000-memory.dmp
          Filesize

          180KB

        • memory/1048-62-0x0000000000690000-0x00000000006AA000-memory.dmp
          Filesize

          104KB

        • memory/1048-59-0x0000000075721000-0x0000000075723000-memory.dmp
          Filesize

          8KB

        • memory/1048-60-0x0000000000230000-0x0000000000231000-memory.dmp
          Filesize

          4KB

        • memory/1052-87-0x0000000000000000-mapping.dmp
        • memory/1052-88-0x000000013FF30000-0x000000013FFC3000-memory.dmp
          Filesize

          588KB

        • memory/1052-89-0x00000000012C0000-0x00000000013E3000-memory.dmp
          Filesize

          1.1MB

        • memory/1208-84-0x0000000003AA0000-0x0000000003AB0000-memory.dmp
          Filesize

          64KB

        • memory/1208-78-0x0000000004A00000-0x0000000004AA3000-memory.dmp
          Filesize

          652KB

        • memory/1208-71-0x0000000006FC0000-0x000000000715F000-memory.dmp
          Filesize

          1.6MB

        • memory/1364-79-0x0000000000000000-mapping.dmp
        • memory/1364-82-0x0000000072541000-0x0000000072543000-memory.dmp
          Filesize

          8KB

        • memory/1584-77-0x0000000000AA0000-0x0000000000B33000-memory.dmp
          Filesize

          588KB

        • memory/1584-76-0x00000000020C0000-0x00000000023C3000-memory.dmp
          Filesize

          3.0MB

        • memory/1584-74-0x0000000000080000-0x00000000000AD000-memory.dmp
          Filesize

          180KB

        • memory/1584-73-0x0000000000CB0000-0x0000000000CB9000-memory.dmp
          Filesize

          36KB

        • memory/1584-72-0x0000000000000000-mapping.dmp