Analysis

  • max time kernel
    12s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    21-04-2021 14:02

General

  • Target

    7f3fc7d086447a7e15e0d32bdd885cbc.exe

  • Size

    270KB

  • MD5

    7f3fc7d086447a7e15e0d32bdd885cbc

  • SHA1

    172a3f88a776b461b0e98f72b55b6a82dcf23f2d

  • SHA256

    ce2ca323cae4838375c60305a3706e6828ab9fd8e30b65b1d0f4c87dbce0f29b

  • SHA512

    0805830a0ad0f7beef0fa993a6a4ffee0fe27bda95e04009317b0779d8fba1b26b1bd48de64f0d682554c614c4df68b16b8af2d0c2e98099d3e15e29650b7554

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.shoprodeovegas.com/xcl/

Decoy

sewingtherose.com

thesmartshareholder.com

afasyah.com

marolamusic.com

lookupgeorgina.com

plataforyou.com

dijcan.com

pawtyparcels.com

interprediction.com

fairerfinancehackathon.net

thehmnshop.com

jocelynlopez.com

launcheffecthouston.com

joyeveryminute.com

spyforu.com

ronerasanjuan.com

gadgetsdesi.com

nmrconsultants.com

travellpod.com

ballparksportscards.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7f3fc7d086447a7e15e0d32bdd885cbc.exe
    "C:\Users\Admin\AppData\Local\Temp\7f3fc7d086447a7e15e0d32bdd885cbc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2988
    • C:\Users\Admin\AppData\Local\Temp\7f3fc7d086447a7e15e0d32bdd885cbc.exe
      "C:\Users\Admin\AppData\Local\Temp\7f3fc7d086447a7e15e0d32bdd885cbc.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:4048

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsg3BE8.tmp\8yuqrvh.dll
    MD5

    9d845aba27c170190365443f32960e9a

    SHA1

    07ba91146d4277f353430d6da94d73cc5f31c60a

    SHA256

    e6174bb1b7294a9ca293dc37b928c9a01af06f535d7cebbe35bc74dffe195639

    SHA512

    eede88327482fe8442447271ba4fbeafbc49b5f60e60558a0d85883b14beb1b7eb3c539cc6b6225767cb198a20552f289d70fd307d5d32982bd5c55c6b77f027

  • memory/2988-117-0x0000000000F01000-0x0000000000F03000-memory.dmp
    Filesize

    8KB

  • memory/2988-116-0x0000000000F00000-0x0000000000F01000-memory.dmp
    Filesize

    4KB

  • memory/4048-115-0x000000000041EB70-mapping.dmp
  • memory/4048-118-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/4048-119-0x0000000000B80000-0x0000000000EA0000-memory.dmp
    Filesize

    3.1MB