Analysis

  • max time kernel
    58s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    22-07-2021 12:01

General

  • Target

    0e715db2198ff670f4bf0e88e0e9b547.exe

  • Size

    633KB

  • MD5

    0e715db2198ff670f4bf0e88e0e9b547

  • SHA1

    2de5030a9261655e5879e4faba7b5e79d1dd483e

  • SHA256

    4dc8cb12314311a3bf1b1afa5cc5483284fda573f18c15ab0fef18b7b9ef9f98

  • SHA512

    8fb7ea121d51c489bac9d8d6b35e94fc8bc5e5e218da53ad952326f6c558fa7484e54842b2c6abba36c5ec5bb0e6eb51fdab46b3f98daee3569ef8c6ec400bcd

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.containerflippers.com/np0c/

Decoy

spartansurebets.com

threelakestradingco.com

metaspace.global

zjenbao.com

directlyincluded.press

peterchadri.com

learnhousebreaking.com

wonobattle.online

leadate.com

shebafarmscali.com

top4thejob.online

awakeyourfaith.com

bedford-st.com

lolwhats.com

cucurumbel.com

lokalbazaar.com

matter.pro

eastcountyanimalrescue.com

musesgirl.com

noordinarydairy.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe
    "C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2576
    • C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe
      C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe vgyjnbhui
      2⤵
        PID:2104
      • C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe
        C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe vgyjnbhui
        2⤵
          PID:1272
        • C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe
          C:\Users\Admin\AppData\Local\Temp\0e715db2198ff670f4bf0e88e0e9b547.exe vgyjnbhui
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          PID:2212

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2212-127-0x000000000041EB90-mapping.dmp
      • memory/2212-126-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/2212-128-0x0000000001070000-0x0000000001390000-memory.dmp
        Filesize

        3.1MB

      • memory/2576-114-0x0000000000FC0000-0x0000000000FC1000-memory.dmp
        Filesize

        4KB

      • memory/2576-116-0x0000000005E20000-0x0000000005E21000-memory.dmp
        Filesize

        4KB

      • memory/2576-117-0x0000000005920000-0x0000000005921000-memory.dmp
        Filesize

        4KB

      • memory/2576-118-0x00000000058A0000-0x00000000058A1000-memory.dmp
        Filesize

        4KB

      • memory/2576-119-0x0000000005810000-0x00000000058A2000-memory.dmp
        Filesize

        584KB

      • memory/2576-120-0x0000000007C20000-0x0000000007C81000-memory.dmp
        Filesize

        388KB

      • memory/2576-125-0x0000000007FC0000-0x0000000008032000-memory.dmp
        Filesize

        456KB