Analysis

  • max time kernel
    150s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    22-07-2021 12:04

General

  • Target

    #6495PI-29458-2020.exe

  • Size

    919KB

  • MD5

    020c3201638570f2858099e3e522a9a0

  • SHA1

    c3977925522b50fc59c2d2e1e014e24052d36fce

  • SHA256

    24e635e80cecd03066225b27fdb524c4542586b22dc820e05f8a02072008c674

  • SHA512

    11455186a0f8d4ad74de60cb4fa2acf399c8c39887ef979fa5b3d2568b530bc5d8c91c70dd3a7621df9e37ba3b1360fe38201146ed39dc185b03656a2ff8e173

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.nouolive.com/wt5i/

Decoy

mydreamct.com

vadicore.com

choicemango.com

projectsolutionspro.com

ncg.xyz

goio.digital

ee-secure-account.com

criminalstudy.com

fsjuanzhi.com

pont-travaux-public.com

agencepartenaire.com

jlsyzm.com

prosselius.com

woodendgroups.com

thereproducts.site

sigmagrupo.net

chelseagracia.com

fusosstore.com

chrissypips.trade

mvlxplcswa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\#6495PI-29458-2020.exe
      "C:\Users\Admin\AppData\Local\Temp\#6495PI-29458-2020.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:772
      • C:\Users\Admin\AppData\Local\Temp\#6495PI-29458-2020.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2124
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\#6495PI-29458-2020.exe"
        3⤵
          PID:508

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/508-133-0x0000000000000000-mapping.dmp
    • memory/772-114-0x00000000000C0000-0x00000000000C1000-memory.dmp
      Filesize

      4KB

    • memory/772-116-0x0000000004A30000-0x0000000004A8F000-memory.dmp
      Filesize

      380KB

    • memory/772-117-0x0000000009320000-0x0000000009321000-memory.dmp
      Filesize

      4KB

    • memory/772-118-0x0000000004B40000-0x0000000004B41000-memory.dmp
      Filesize

      4KB

    • memory/772-119-0x0000000004B10000-0x0000000004B11000-memory.dmp
      Filesize

      4KB

    • memory/772-120-0x0000000004A90000-0x0000000004A91000-memory.dmp
      Filesize

      4KB

    • memory/772-121-0x00000000050D0000-0x00000000050D2000-memory.dmp
      Filesize

      8KB

    • memory/772-122-0x0000000005180000-0x0000000005181000-memory.dmp
      Filesize

      4KB

    • memory/772-123-0x00000000070A0000-0x000000000711F000-memory.dmp
      Filesize

      508KB

    • memory/772-124-0x0000000005B90000-0x0000000005BC0000-memory.dmp
      Filesize

      192KB

    • memory/2068-130-0x0000000000000000-mapping.dmp
    • memory/2068-132-0x0000000000E80000-0x0000000000EAE000-memory.dmp
      Filesize

      184KB

    • memory/2068-131-0x0000000000EB0000-0x0000000001023000-memory.dmp
      Filesize

      1.4MB

    • memory/2068-134-0x0000000004800000-0x0000000004B20000-memory.dmp
      Filesize

      3.1MB

    • memory/2068-135-0x0000000004B20000-0x0000000004BB3000-memory.dmp
      Filesize

      588KB

    • memory/2124-128-0x0000000001170000-0x0000000001184000-memory.dmp
      Filesize

      80KB

    • memory/2124-127-0x0000000001230000-0x0000000001550000-memory.dmp
      Filesize

      3.1MB

    • memory/2124-126-0x000000000041EB20-mapping.dmp
    • memory/2124-125-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/2832-129-0x0000000002EA0000-0x0000000002F88000-memory.dmp
      Filesize

      928KB

    • memory/2832-136-0x00000000062E0000-0x00000000063A0000-memory.dmp
      Filesize

      768KB