Analysis

  • max time kernel
    150s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    08-05-2021 06:46

General

  • Target

    GZocMWoCzL3Rd62.exe

  • Size

    776KB

  • MD5

    7fa5e34cdc678f80f7086dae5da6c932

  • SHA1

    17a328e171beeaeb9cbf2c6fae4d1767c4f859bf

  • SHA256

    de96d53592393fa5cd5dc6ed2d8d9430245ac083643591b6f060a4efc2e044d6

  • SHA512

    e45190526be45344626a8cc4d769118927f3eab017e3a631c5d9dd34a8fbdcdce4719f54704cfef10b91980e83a667c09178b366ac48b6d4f1ceecac832ce017

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.itoatoapparel.com/hfg/

Decoy

0nqcaw.com

seamtube.com

chinachongren.com

shop-deinen-deal.com

socialmediabutler.net

careerenabler.net

trumpmasksshop.com

theopulencegroups.com

meshfacilities.com

sedaifu.com

ahesitanttraveler.com

xn--nbkvf9b5bzfx438ch6sa.com

iqrafootwearbd.com

akurasushinewyorkny.com

paginasny.com

www7shire.com

frenchyoutlet.com

lw14.com

nmdetransports.net

advjuniorconsultoria.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe
      "C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:424
      • C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe
        "C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe"
        3⤵
          PID:2700
        • C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe
          "C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:412
      • C:\Windows\SysWOW64\colorcpl.exe
        "C:\Windows\SysWOW64\colorcpl.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2092
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\GZocMWoCzL3Rd62.exe"
          3⤵
            PID:2976

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/412-125-0x000000000041EBA0-mapping.dmp
      • memory/412-128-0x0000000001780000-0x0000000001794000-memory.dmp
        Filesize

        80KB

      • memory/412-127-0x00000000017A0000-0x0000000001AC0000-memory.dmp
        Filesize

        3.1MB

      • memory/412-124-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/424-120-0x0000000004B50000-0x000000000504E000-memory.dmp
        Filesize

        5.0MB

      • memory/424-114-0x0000000000030000-0x0000000000031000-memory.dmp
        Filesize

        4KB

      • memory/424-121-0x0000000004BE0000-0x0000000004BEE000-memory.dmp
        Filesize

        56KB

      • memory/424-122-0x0000000000970000-0x0000000000A12000-memory.dmp
        Filesize

        648KB

      • memory/424-123-0x0000000007C40000-0x0000000007C9D000-memory.dmp
        Filesize

        372KB

      • memory/424-119-0x0000000004A50000-0x0000000004A51000-memory.dmp
        Filesize

        4KB

      • memory/424-118-0x0000000004BF0000-0x0000000004BF1000-memory.dmp
        Filesize

        4KB

      • memory/424-117-0x0000000004A70000-0x0000000004A71000-memory.dmp
        Filesize

        4KB

      • memory/424-116-0x0000000005050000-0x0000000005051000-memory.dmp
        Filesize

        4KB

      • memory/2092-132-0x0000000001240000-0x0000000001259000-memory.dmp
        Filesize

        100KB

      • memory/2092-130-0x0000000000000000-mapping.dmp
      • memory/2092-133-0x0000000000E10000-0x0000000000E3E000-memory.dmp
        Filesize

        184KB

      • memory/2092-134-0x0000000004E00000-0x0000000005120000-memory.dmp
        Filesize

        3.1MB

      • memory/2092-135-0x0000000004C90000-0x0000000004D23000-memory.dmp
        Filesize

        588KB

      • memory/2180-129-0x00000000064B0000-0x00000000065B3000-memory.dmp
        Filesize

        1.0MB

      • memory/2180-136-0x00000000066C0000-0x0000000006820000-memory.dmp
        Filesize

        1.4MB

      • memory/2976-131-0x0000000000000000-mapping.dmp