Analysis

  • max time kernel
    150s
  • max time network
    136s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    04-05-2021 02:00

General

  • Target

    propser16364.exe

  • Size

    228KB

  • MD5

    aa6168d4e41ced2091baee9f5d59e11e

  • SHA1

    de7f4a8270fe216e68076ce93243b60d6d6d5f51

  • SHA256

    7c6393b4e86ea5cec49c0f814b17e4bb85aa447c19896037252a94ff6416ce1b

  • SHA512

    37c5d51495c0b53bdcd522d3b4a0346202d6069002b8d35f913a96596eb1a51c4fa41e445673024fbb62b4f701355aabb2e1804075709693c6339d1c3dad95e2

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.shoprodeovegas.com/xcl/

Decoy

sewingtherose.com

thesmartshareholder.com

afasyah.com

marolamusic.com

lookupgeorgina.com

plataforyou.com

dijcan.com

pawtyparcels.com

interprediction.com

fairerfinancehackathon.net

thehmnshop.com

jocelynlopez.com

launcheffecthouston.com

joyeveryminute.com

spyforu.com

ronerasanjuan.com

gadgetsdesi.com

nmrconsultants.com

travellpod.com

ballparksportscards.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\propser16364.exe
    "C:\Users\Admin\AppData\Local\Temp\propser16364.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Users\Admin\AppData\Local\Temp\propser16364.exe
      "C:\Users\Admin\AppData\Local\Temp\propser16364.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1796
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2668
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\propser16364.exe"
        3⤵
          PID:732

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nst1015.tmp\ghvea31n0uw.dll
      MD5

      7bee24f38e906d08f10c1b51be4be749

      SHA1

      588f2f0f8b859e15620fbec8e6381c6addf2a3fd

      SHA256

      974e158ea37951d137839d4189279330aa2e85f5bafa4f273f7007673cd4d3fc

      SHA512

      417032d0c0decacd4332d9379843ef358b553960a2c00caf470d129f6f797aed3eb180a3e2182eb5e443772d24b8e8c7fe4bd3b06909b2a555a8e7c063137e25

    • memory/732-122-0x0000000000000000-mapping.dmp
    • memory/1796-115-0x000000000041EB70-mapping.dmp
    • memory/1796-117-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1796-119-0x00000000009E0000-0x00000000009F4000-memory.dmp
      Filesize

      80KB

    • memory/1796-118-0x0000000000AC0000-0x0000000000DE0000-memory.dmp
      Filesize

      3.1MB

    • memory/2208-116-0x00000000009B0000-0x00000000009B2000-memory.dmp
      Filesize

      8KB

    • memory/2668-123-0x0000000000FB0000-0x0000000000FB7000-memory.dmp
      Filesize

      28KB

    • memory/2668-121-0x0000000000000000-mapping.dmp
    • memory/2668-124-0x0000000000E00000-0x0000000000E2E000-memory.dmp
      Filesize

      184KB

    • memory/2668-125-0x0000000002FC0000-0x000000000310A000-memory.dmp
      Filesize

      1.3MB

    • memory/2668-126-0x0000000003380000-0x0000000003413000-memory.dmp
      Filesize

      588KB

    • memory/3048-120-0x0000000005700000-0x0000000005886000-memory.dmp
      Filesize

      1.5MB

    • memory/3048-127-0x0000000005890000-0x0000000005A17000-memory.dmp
      Filesize

      1.5MB