Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    06-05-2021 12:53

General

  • Target

    PO506202100.exe

  • Size

    742KB

  • MD5

    7c1896eeb884021f4d74144ec78be2e8

  • SHA1

    b4fb3b31f69fc5b048eeb43ea6f8fd97f1fb8f7a

  • SHA256

    1ab3c31624f7aed4e2ec9feecee3cff24e8904709800508e13b6526369e02236

  • SHA512

    e90782dc8b8cbfa8f6052080c6daeaffccede01d57bb944a4d52b9a0fae5fe53009ba0dd4b8c5932ee09c808db38fba27bd7bc6d570d55936b49c7259bc4d935

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.info/3nop/

Decoy

bakecakesandmore.com

shenglisuoye.com

chinapopfactory.com

ynlrhd.com

liqourforyou.com

leonqamil.com

meccafon.com

online-marketing-strategie.biz

rbfxi.com

frseyb.info

leyu91.com

hotsmail.today

beepot.tech

dunaemmetmobility.com

sixpenceworkshop.com

incrediblefavorcoaching.com

pofo.info

yanshudaili.com

yellowbrickwedding.com

paintpartyblueprint.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\PO506202100.exe
      "C:\Users\Admin\AppData\Local\Temp\PO506202100.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Windows\SysWOW64\secinit.exe
        C:\Windows\System32\secinit.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2116
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4016
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\secinit.exe"
        3⤵
          PID:640
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:812

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/640-128-0x0000000000000000-mapping.dmp
      • memory/812-134-0x00000174B2B00000-0x00000174B2BE2000-memory.dmp
        Filesize

        904KB

      • memory/812-132-0x0000000000000000-mapping.dmp
      • memory/812-133-0x00007FF6B5060000-0x00007FF6B50F3000-memory.dmp
        Filesize

        588KB

      • memory/2116-121-0x0000000010410000-0x000000001043D000-memory.dmp
        Filesize

        180KB

      • memory/2116-120-0x0000000000750000-0x0000000000751000-memory.dmp
        Filesize

        4KB

      • memory/2116-123-0x0000000000CD0000-0x0000000000CE4000-memory.dmp
        Filesize

        80KB

      • memory/2116-122-0x00000000049B0000-0x0000000004CD0000-memory.dmp
        Filesize

        3.1MB

      • memory/2116-119-0x0000000000000000-mapping.dmp
      • memory/2204-114-0x0000000000540000-0x0000000000541000-memory.dmp
        Filesize

        4KB

      • memory/2204-117-0x00000000006A0000-0x00000000006BA000-memory.dmp
        Filesize

        104KB

      • memory/3048-124-0x0000000006860000-0x0000000006993000-memory.dmp
        Filesize

        1.2MB

      • memory/3048-131-0x00000000070D0000-0x000000000723F000-memory.dmp
        Filesize

        1.4MB

      • memory/4016-125-0x0000000000000000-mapping.dmp
      • memory/4016-130-0x0000000001060000-0x00000000010F3000-memory.dmp
        Filesize

        588KB

      • memory/4016-129-0x0000000004790000-0x0000000004AB0000-memory.dmp
        Filesize

        3.1MB

      • memory/4016-127-0x0000000000540000-0x000000000056D000-memory.dmp
        Filesize

        180KB

      • memory/4016-126-0x0000000001370000-0x0000000001389000-memory.dmp
        Filesize

        100KB