Analysis

  • max time kernel
    149s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    10-05-2021 19:02

General

  • Target

    PL_106104.exe

  • Size

    503KB

  • MD5

    77f1784fa00332d5623aba88277eb8c1

  • SHA1

    248f8ad49c0d3ef5ddbfaa5a8721aa4dc08acdf5

  • SHA256

    7515beb02e1280d143b4716f8919e34fadfc7c806e5a354dc3dcd1dd3318882c

  • SHA512

    28e6d83ed4f71557ad2d6a8c026d4ce57082cc95517aae0f7243aafc3edd5f1db70778a290b62f433fb4a5d31d3d8c9c8f119d45f9e01b8a0d6343e7a3e077c7

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.cornerstonerecruitmentasia.com/nke/

Decoy

igroomed.com

teksoles.com

day7.today

workseap.com

arvinlapid.com

tigerk2.com

serenablackcreatives.com

ladyyougotballs.com

sahnakz.com

farmandranchexchange.com

sentinam.info

slapnmacs.com

healthygut365.com

maximepilorge.com

ishratsvalley.com

peridotalchemy.com

solevux.com

xn--vkc6b6baa6ac1jbwc6l.com

dailyruminant.com

loocalcryptos.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\PL_106104.exe
      "C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1096
      • C:\Users\Admin\AppData\Local\Temp\PL_106104.exe
        C:\Users\Admin\AppData\Local\Temp\PL_106104.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1720
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PL_106104.exe"
        3⤵
        • Deletes itself
        PID:404

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/404-74-0x0000000000000000-mapping.dmp

  • memory/1096-61-0x00000000011D0000-0x00000000011D1000-memory.dmp

    Filesize

    4KB

  • memory/1096-62-0x0000000005800000-0x000000000588A000-memory.dmp

    Filesize

    552KB

  • memory/1096-63-0x0000000000B80000-0x0000000000BB7000-memory.dmp

    Filesize

    220KB

  • memory/1096-59-0x0000000001220000-0x0000000001221000-memory.dmp

    Filesize

    4KB

  • memory/1248-69-0x0000000006C70000-0x0000000006DF3000-memory.dmp

    Filesize

    1.5MB

  • memory/1248-77-0x0000000005FF0000-0x00000000060D3000-memory.dmp

    Filesize

    908KB

  • memory/1680-65-0x000000000041EB70-mapping.dmp

  • memory/1680-68-0x00000000001D0000-0x00000000001E4000-memory.dmp

    Filesize

    80KB

  • memory/1680-67-0x0000000000880000-0x0000000000B83000-memory.dmp

    Filesize

    3.0MB

  • memory/1680-64-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1720-70-0x0000000000000000-mapping.dmp

  • memory/1720-71-0x0000000075281000-0x0000000075283000-memory.dmp

    Filesize

    8KB

  • memory/1720-72-0x0000000000960000-0x000000000097F000-memory.dmp

    Filesize

    124KB

  • memory/1720-73-0x0000000000080000-0x00000000000AE000-memory.dmp

    Filesize

    184KB

  • memory/1720-75-0x0000000002050000-0x0000000002353000-memory.dmp

    Filesize

    3.0MB

  • memory/1720-76-0x0000000001D80000-0x0000000001E13000-memory.dmp

    Filesize

    588KB