Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    07-05-2021 09:06

General

  • Target

    Il nuovo ordine e nell'elenco allegato.exe

  • Size

    892KB

  • MD5

    9846100114f47c1fb95da84c09ef9f0d

  • SHA1

    715510bcef9517706b28ea506e39df8e4c8c4f5f

  • SHA256

    e01f8eb3903e53f65591dbfb5ae2dda83eb77b50ddfa598ca12fc627e35fe2fa

  • SHA512

    447b2bb4b7adc2ec150a324d1c2909b00742c3741af8996d043158436219def4899b44d69d6d1e518810cf945dc2d7b7e84e5952686bee858eb4123eb96678c0

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.joomlas123.info/3nop/

Decoy

bakecakesandmore.com

shenglisuoye.com

chinapopfactory.com

ynlrhd.com

liqourforyou.com

leonqamil.com

meccafon.com

online-marketing-strategie.biz

rbfxi.com

frseyb.info

leyu91.com

hotsmail.today

beepot.tech

dunaemmetmobility.com

sixpenceworkshop.com

incrediblefavorcoaching.com

pofo.info

yanshudaili.com

yellowbrickwedding.com

paintpartyblueprint.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3016
    • C:\Users\Admin\AppData\Local\Temp\Il nuovo ordine e nell'elenco allegato.exe
      "C:\Users\Admin\AppData\Local\Temp\Il nuovo ordine e nell'elenco allegato.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:508
      • C:\Windows\SysWOW64\logagent.exe
        C:\Windows\System32\logagent.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:8
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2444
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\logagent.exe"
        3⤵
          PID:3960
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1220

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/8-115-0x0000000000000000-mapping.dmp
      • memory/8-117-0x0000000010410000-0x000000001043D000-memory.dmp
        Filesize

        180KB

      • memory/8-116-0x00000000007D0000-0x00000000007D1000-memory.dmp
        Filesize

        4KB

      • memory/8-118-0x0000000004970000-0x0000000004C90000-memory.dmp
        Filesize

        3.1MB

      • memory/8-119-0x0000000002E70000-0x0000000002E84000-memory.dmp
        Filesize

        80KB

      • memory/508-114-0x00000000004F0000-0x000000000063A000-memory.dmp
        Filesize

        1.3MB

      • memory/1220-129-0x00007FF61C540000-0x00007FF61C5D3000-memory.dmp
        Filesize

        588KB

      • memory/1220-130-0x00000229B6B40000-0x00000229B6CA7000-memory.dmp
        Filesize

        1.4MB

      • memory/1220-128-0x0000000000000000-mapping.dmp
      • memory/2444-126-0x0000000004400000-0x0000000004493000-memory.dmp
        Filesize

        588KB

      • memory/2444-123-0x0000000000B20000-0x0000000000B36000-memory.dmp
        Filesize

        88KB

      • memory/2444-125-0x0000000004500000-0x0000000004820000-memory.dmp
        Filesize

        3.1MB

      • memory/2444-124-0x0000000002B90000-0x0000000002BBD000-memory.dmp
        Filesize

        180KB

      • memory/2444-121-0x0000000000000000-mapping.dmp
      • memory/3016-127-0x0000000005880000-0x00000000059E2000-memory.dmp
        Filesize

        1.4MB

      • memory/3016-120-0x00000000069E0000-0x0000000006B1B000-memory.dmp
        Filesize

        1.2MB

      • memory/3960-122-0x0000000000000000-mapping.dmp