Analysis

  • max time kernel
    149s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    02-05-2021 07:02

General

  • Target

    ETC-B72-LT-0149-03-AR.exe

  • Size

    228KB

  • MD5

    dc27e4474182fe41de857278c2488574

  • SHA1

    0b5b93dc9e3389de1a3d04c4d03fa5c0532aef1e

  • SHA256

    facc651f7697bb357b528e0fdcbfcb0601abcaad0f2bd31eee54792aa8ee66e3

  • SHA512

    9025ad32d289464770182ce597838a1a0c79aff8a337c0e9a3a5ecf4f7343f24029a7551c6a6559d36a6e4e624429241445984ef5e987c88952eb87529f01fed

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.shoprodeovegas.com/xcl/

Decoy

sewingtherose.com

thesmartshareholder.com

afasyah.com

marolamusic.com

lookupgeorgina.com

plataforyou.com

dijcan.com

pawtyparcels.com

interprediction.com

fairerfinancehackathon.net

thehmnshop.com

jocelynlopez.com

launcheffecthouston.com

joyeveryminute.com

spyforu.com

ronerasanjuan.com

gadgetsdesi.com

nmrconsultants.com

travellpod.com

ballparksportscards.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3036
    • C:\Users\Admin\AppData\Local\Temp\ETC-B72-LT-0149-03-AR.exe
      "C:\Users\Admin\AppData\Local\Temp\ETC-B72-LT-0149-03-AR.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3016
      • C:\Users\Admin\AppData\Local\Temp\ETC-B72-LT-0149-03-AR.exe
        "C:\Users\Admin\AppData\Local\Temp\ETC-B72-LT-0149-03-AR.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2512
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3944
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\ETC-B72-LT-0149-03-AR.exe"
        3⤵
          PID:1344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsm24C6.tmp\qbii7uu.dll

      MD5

      aa71628f8f750412e5598782696963c7

      SHA1

      5dd7ab9fce05bd2c5a72880983878846280f2cfb

      SHA256

      7449a16fc696e45fa2c1b96c9d2c785b9f54cca48c453f764fcaed0031943bac

      SHA512

      62c279a0df143581d7c94e76c62266d65514c2d8c7819cec1b92d7e8e0287ed9043a1b0c900d848bacb94bdb31c4593e29f6906fc4570ff9f5abaf17886b8677

    • memory/1344-122-0x0000000000000000-mapping.dmp

    • memory/2512-119-0x00000000006F0000-0x0000000000704000-memory.dmp

      Filesize

      80KB

    • memory/2512-117-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/2512-118-0x00000000009E0000-0x0000000000D00000-memory.dmp

      Filesize

      3.1MB

    • memory/2512-116-0x000000000041EB70-mapping.dmp

    • memory/3016-115-0x0000000000790000-0x0000000000792000-memory.dmp

      Filesize

      8KB

    • memory/3036-120-0x0000000005A30000-0x0000000005BB0000-memory.dmp

      Filesize

      1.5MB

    • memory/3036-127-0x0000000005F20000-0x000000000603F000-memory.dmp

      Filesize

      1.1MB

    • memory/3944-121-0x0000000000000000-mapping.dmp

    • memory/3944-124-0x00000000007C0000-0x00000000007EE000-memory.dmp

      Filesize

      184KB

    • memory/3944-125-0x0000000002C90000-0x0000000002DDA000-memory.dmp

      Filesize

      1.3MB

    • memory/3944-123-0x0000000000C30000-0x0000000000C89000-memory.dmp

      Filesize

      356KB

    • memory/3944-126-0x0000000003250000-0x00000000032E3000-memory.dmp

      Filesize

      588KB