Analysis
-
max time kernel
146s -
max time network
137s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
20-04-2021 14:38
Static task
static1
Behavioral task
behavioral1
Sample
Invoice pdf.exe
Resource
win7v20210410
General
-
Target
Invoice pdf.exe
-
Size
661KB
-
MD5
95ad0de0d121d51993dc0e546f82772c
-
SHA1
e2830744f6497321e7b4c2a49d8270ea91b923c8
-
SHA256
494b892495fb6f002fd36477446bfc59f686fe73710d55dc782de8512452e535
-
SHA512
07b83558bd2269cdafd56ca91ddbe396b1d76cc5466fe13f2fff102ce49afedcb446b734922cd4dd6f8f9d2ac80bdcd8f9287ac11415c3c1d3f6dceaef8fe5ae
Malware Config
Extracted
formbook
4.1
http://w����5 �@q[*��S=���m
Signatures
-
Formbook Payload 3 IoCs
Processes:
resource yara_rule behavioral1/memory/568-66-0x0000000000400000-0x000000000042E000-memory.dmp formbook behavioral1/memory/568-67-0x000000000041EAC0-mapping.dmp formbook behavioral1/memory/112-76-0x0000000000100000-0x000000000012E000-memory.dmp formbook -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 1968 cmd.exe -
Suspicious use of SetThreadContext 3 IoCs
Processes:
Invoice pdf.exeInvoice pdf.exeipconfig.exedescription pid process target process PID 1104 set thread context of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 568 set thread context of 1240 568 Invoice pdf.exe Explorer.EXE PID 112 set thread context of 1240 112 ipconfig.exe Explorer.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 112 ipconfig.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
Processes:
Invoice pdf.exeInvoice pdf.exeipconfig.exepid process 1104 Invoice pdf.exe 1104 Invoice pdf.exe 1104 Invoice pdf.exe 568 Invoice pdf.exe 568 Invoice pdf.exe 112 ipconfig.exe 112 ipconfig.exe 112 ipconfig.exe 112 ipconfig.exe 112 ipconfig.exe 112 ipconfig.exe 112 ipconfig.exe 112 ipconfig.exe -
Suspicious behavior: MapViewOfSection 5 IoCs
Processes:
Invoice pdf.exeipconfig.exepid process 568 Invoice pdf.exe 568 Invoice pdf.exe 568 Invoice pdf.exe 112 ipconfig.exe 112 ipconfig.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Invoice pdf.exeInvoice pdf.exeipconfig.exedescription pid process Token: SeDebugPrivilege 1104 Invoice pdf.exe Token: SeDebugPrivilege 568 Invoice pdf.exe Token: SeDebugPrivilege 112 ipconfig.exe -
Suspicious use of WriteProcessMemory 19 IoCs
Processes:
Invoice pdf.exeExplorer.EXEipconfig.exedescription pid process target process PID 1104 wrote to memory of 804 1104 Invoice pdf.exe schtasks.exe PID 1104 wrote to memory of 804 1104 Invoice pdf.exe schtasks.exe PID 1104 wrote to memory of 804 1104 Invoice pdf.exe schtasks.exe PID 1104 wrote to memory of 804 1104 Invoice pdf.exe schtasks.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1104 wrote to memory of 568 1104 Invoice pdf.exe Invoice pdf.exe PID 1240 wrote to memory of 112 1240 Explorer.EXE ipconfig.exe PID 1240 wrote to memory of 112 1240 Explorer.EXE ipconfig.exe PID 1240 wrote to memory of 112 1240 Explorer.EXE ipconfig.exe PID 1240 wrote to memory of 112 1240 Explorer.EXE ipconfig.exe PID 112 wrote to memory of 1968 112 ipconfig.exe cmd.exe PID 112 wrote to memory of 1968 112 ipconfig.exe cmd.exe PID 112 wrote to memory of 1968 112 ipconfig.exe cmd.exe PID 112 wrote to memory of 1968 112 ipconfig.exe cmd.exe
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\Invoice pdf.exe"C:\Users\Admin\AppData\Local\Temp\Invoice pdf.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gXUZJVkFviCTU" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA6CA.tmp"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\Invoice pdf.exe"C:\Users\Admin\AppData\Local\Temp\Invoice pdf.exe"3⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\ipconfig.exe"C:\Windows\SysWOW64\ipconfig.exe"2⤵
- Suspicious use of SetThreadContext
- Gathers network information
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: MapViewOfSection
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe/c del "C:\Users\Admin\AppData\Local\Temp\Invoice pdf.exe"3⤵
- Deletes itself
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpA6CA.tmpMD5
913058c6cc7688e86d18c1325942fe21
SHA124256bd5b231aa9c6d52b7304adaa685d8ada878
SHA2562ee0dbcbf46a558b45959063f8666636d0333df1a1b22dde760fae3ce7757ede
SHA51289952ea1c3fe61c73508802408e3bb6d6dfdf43b59e674513eca213aa5ed7c9819d5dbb98cd3a1b8e8988947614b2e0c8791837e4991b244cdf89825677f4d34
-
memory/112-72-0x0000000000000000-mapping.dmp
-
memory/112-78-0x0000000000AC0000-0x0000000000B53000-memory.dmpFilesize
588KB
-
memory/112-77-0x00000000021C0000-0x00000000024C3000-memory.dmpFilesize
3.0MB
-
memory/112-76-0x0000000000100000-0x000000000012E000-memory.dmpFilesize
184KB
-
memory/112-75-0x0000000000DB0000-0x0000000000DBA000-memory.dmpFilesize
40KB
-
memory/568-66-0x0000000000400000-0x000000000042E000-memory.dmpFilesize
184KB
-
memory/568-67-0x000000000041EAC0-mapping.dmp
-
memory/568-69-0x0000000000810000-0x0000000000B13000-memory.dmpFilesize
3.0MB
-
memory/568-70-0x00000000002A0000-0x00000000002B4000-memory.dmpFilesize
80KB
-
memory/804-64-0x0000000000000000-mapping.dmp
-
memory/1104-60-0x0000000076E11000-0x0000000076E13000-memory.dmpFilesize
8KB
-
memory/1104-63-0x000000007EF50000-0x000000007EF51000-memory.dmpFilesize
4KB
-
memory/1104-62-0x0000000000371000-0x0000000000372000-memory.dmpFilesize
4KB
-
memory/1104-61-0x0000000000370000-0x0000000000371000-memory.dmpFilesize
4KB
-
memory/1240-71-0x00000000063E0000-0x0000000006502000-memory.dmpFilesize
1.1MB
-
memory/1240-79-0x0000000006970000-0x0000000006ACD000-memory.dmpFilesize
1.4MB
-
memory/1968-74-0x0000000000000000-mapping.dmp