Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    22-07-2021 12:01

General

  • Target

    0e715db2198ff670f4bf0e88e0e9b547.exe

  • Size

    633KB

  • MD5

    0e715db2198ff670f4bf0e88e0e9b547

  • SHA1

    2de5030a9261655e5879e4faba7b5e79d1dd483e

  • SHA256

    4dc8cb12314311a3bf1b1afa5cc5483284fda573f18c15ab0fef18b7b9ef9f98

  • SHA512

    8fb7ea121d51c489bac9d8d6b35e94fc8bc5e5e218da53ad952326f6c558fa7484e54842b2c6abba36c5ec5bb0e6eb51fdab46b3f98daee3569ef8c6ec400bcd

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.containerflippers.com/np0c/

Decoy

spartansurebets.com

threelakestradingco.com

metaspace.global

zjenbao.com

directlyincluded.press

peterchadri.com

learnhousebreaking.com

wonobattle.online

leadate.com

shebafarmscali.com

top4thejob.online

awakeyourfaith.com

bedford-st.com

lolwhats.com

cucurumbel.com

lokalbazaar.com

matter.pro

eastcountyanimalrescue.com

musesgirl.com

noordinarydairy.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe
    "C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1948
    • C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe
      C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe vgyjnbhui
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:996

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/996-69-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/996-70-0x000000000041EB90-mapping.dmp
  • memory/996-71-0x0000000000800000-0x0000000000B03000-memory.dmp
    Filesize

    3.0MB

  • memory/1948-60-0x0000000000C90000-0x0000000000C91000-memory.dmp
    Filesize

    4KB

  • memory/1948-62-0x0000000004900000-0x0000000004901000-memory.dmp
    Filesize

    4KB

  • memory/1948-63-0x0000000000B70000-0x0000000000BD1000-memory.dmp
    Filesize

    388KB

  • memory/1948-68-0x0000000005090000-0x0000000005102000-memory.dmp
    Filesize

    456KB