Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    30-04-2021 13:31

General

  • Target

    89002.msi

  • Size

    256KB

  • MD5

    a75dd7431fff6664e2a12263881315ef

  • SHA1

    b28f29e87fe4b79bc87fe860d21a16780d31069c

  • SHA256

    6120294360629da33cd6f897de16401325be12ae2cd9dcc03857de7e0b4f94e4

  • SHA512

    dcef03d5e4678aa23d98284cc4c93d535885d6c6b3d2454f12803042393323275db7b32c0d7a553853fffba899d63a5d58fb92e75116d317533879fc28ebcc83

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.111bjs.com/ccr/

Decoy

abdullahlodhi.com

jevya.com

knoxvillerestaurant.com

mekarauroko7389.com

cricketspowder.net

johannchirinos.com

orangeorganical.com

libero-tt.com

lorenaegianluca.com

wintab.net

modernmillievintage.com

zgdqcyw.com

jeffabildgaardmd.com

nurulfikrimakassar.com

findyourchef.com

innovationsservicegroup.com

destek-taleplerimiz.com

whfqqco.icu

kosmetikmadeingermany.com

dieteticos.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • NSIS installer 6 IoCs
  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Windows\system32\msiexec.exe
      msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\89002.msi
      2⤵
      • Enumerates connected drives
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      PID:2544
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Installer\MSIB1E3.tmp"
        3⤵
          PID:4004
    • C:\Windows\system32\msiexec.exe
      C:\Windows\system32\msiexec.exe /V
      1⤵
      • Enumerates connected drives
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Windows\system32\srtasks.exe
        C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
        2⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:2776
      • C:\Windows\Installer\MSIB1E3.tmp
        "C:\Windows\Installer\MSIB1E3.tmp"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3556
        • C:\Windows\Installer\MSIB1E3.tmp
          "C:\Windows\Installer\MSIB1E3.tmp"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2148
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2844
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:3944

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\Installer\MSIB1E3.tmp

      MD5

      4f7763bf413f2e070a154ed73dc14ee0

      SHA1

      d088a5e16d0a634cca9be31630e0743722be7804

      SHA256

      5e29e1f268987df8f3a74504ee4926ad1a82c11f016d9aad8818f89202d102ad

      SHA512

      0e2735d69847b9fb6522e0af22e2225246ee74e6899a23c2d814e4e4b7f907545c00e6162321296f7cd1c53169482b11e106c9e3b721ad63bb19acfd99c45755

    • C:\Windows\Installer\MSIB1E3.tmp

      MD5

      4f7763bf413f2e070a154ed73dc14ee0

      SHA1

      d088a5e16d0a634cca9be31630e0743722be7804

      SHA256

      5e29e1f268987df8f3a74504ee4926ad1a82c11f016d9aad8818f89202d102ad

      SHA512

      0e2735d69847b9fb6522e0af22e2225246ee74e6899a23c2d814e4e4b7f907545c00e6162321296f7cd1c53169482b11e106c9e3b721ad63bb19acfd99c45755

    • C:\Windows\Installer\MSIB1E3.tmp

      MD5

      4f7763bf413f2e070a154ed73dc14ee0

      SHA1

      d088a5e16d0a634cca9be31630e0743722be7804

      SHA256

      5e29e1f268987df8f3a74504ee4926ad1a82c11f016d9aad8818f89202d102ad

      SHA512

      0e2735d69847b9fb6522e0af22e2225246ee74e6899a23c2d814e4e4b7f907545c00e6162321296f7cd1c53169482b11e106c9e3b721ad63bb19acfd99c45755

    • \??\GLOBALROOT\Device\HarddiskVolumeShadowCopy2\System Volume Information\SPP\metadata-2

      MD5

      0efb96fbd5d4765e6d151a23773c15e3

      SHA1

      026cd414eb14d7ea38b88ad2de783ad6bc8cfb4d

      SHA256

      6fcc5d7be9284c5c3954f720c18b12860a65d3a0c418f9769574dc7cf2d26a2b

      SHA512

      ab19270f5a079eb54015f6bee833b2cd695df63e344ebf1d5d217eaea1e18244ec2d1b226cf68f540d8ac81d12a5db1d8ed8e012f8ea94e43ce590ed7ef05e98

    • \??\Volume{d05cfc4a-0000-0000-0000-500600000000}\System Volume Information\SPP\OnlineMetadataCache\{3483b9a0-d0d6-4eeb-8006-e476c407443f}_OnDiskSnapshotProp

      MD5

      939663dd2c8cdc821359e6c80a6797f9

      SHA1

      425fa6af476381ca79d88be32e1070710a6c8da0

      SHA256

      2b78fb04b9d6dd9e542c043a0fa9ce38049715156a592325a97d857ac70b9f27

      SHA512

      4e40df4386b2dee5424a684da2983b0474732a491eed85c4f6a261b4d78de7aeb36798bdb01efb6af469330d9fac39ee166845a76f7de48ec03a994f928c1cb9

    • \Users\Admin\AppData\Local\Temp\nskB88A.tmp\qldlbh595.dll

      MD5

      c44409c99eee911adfed34a93895b98d

      SHA1

      4093cbb2cbba39ce5093fffc3dca7c091780d0c1

      SHA256

      00b12204f9f4d1f3079dfdcb17ea31aa4c975ee452a6688e168ba37a623114f4

      SHA512

      0ab0e60c8c7f797f7b92714db6cf97475df26b0ea7752d78fbd453575630df34e89a178026c2ed0104b44996f9e397d951f5632942c688c194713c714d49822d

    • memory/2148-127-0x0000000000AA0000-0x0000000000DC0000-memory.dmp

      Filesize

      3.1MB

    • memory/2148-124-0x000000000041EBB0-mapping.dmp

    • memory/2148-128-0x00000000009E0000-0x00000000009F4000-memory.dmp

      Filesize

      80KB

    • memory/2148-126-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2640-134-0x00000000048D0000-0x0000000004BF0000-memory.dmp

      Filesize

      3.1MB

    • memory/2640-130-0x0000000000000000-mapping.dmp

    • memory/2640-137-0x00000000045A0000-0x0000000004633000-memory.dmp

      Filesize

      588KB

    • memory/2640-133-0x0000000002D20000-0x0000000002D4E000-memory.dmp

      Filesize

      184KB

    • memory/2640-132-0x0000000000240000-0x00000000003B3000-memory.dmp

      Filesize

      1.4MB

    • memory/2776-118-0x0000000000000000-mapping.dmp

    • memory/3016-129-0x0000000006AA0000-0x0000000006B55000-memory.dmp

      Filesize

      724KB

    • memory/3016-138-0x0000000006B60000-0x0000000006C90000-memory.dmp

      Filesize

      1.2MB

    • memory/3556-123-0x0000000002370000-0x00000000023D7000-memory.dmp

      Filesize

      412KB

    • memory/3556-119-0x0000000000000000-mapping.dmp

    • memory/4004-131-0x0000000000000000-mapping.dmp