Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    22-07-2021 11:17

General

  • Target

    Purchase Order.exe

  • Size

    916KB

  • MD5

    c13f1850e9d955f826620bd1ae322368

  • SHA1

    1329de0499fabc6fcffd4fa02864968acaac253e

  • SHA256

    419d8b92dc042882bb3261de70dfe4a158bc9ca436c71f9bf330bb8a6917d04c

  • SHA512

    8d11bbe6afadbd108f227bb3397334f27eb69859b19e82ae436ea91a9f9b6b786c83a55a2fe0f71b15875ec51df8b19f367941420e5972eb2a06e6163aed2657

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.valiantfinancial.net/hth0/

Decoy

grahamandjana.com

surfpodcastnetwork.com

valkyrie20.com

hire4looks.com

wewalkfastasone.com

saveourschoolyear.com

5g23e.com

abusinesssystems.com

telefonepantalla.com

tailorscafe.com

schwarzer-markt.net

stopwatch247.com

458grandbetting.com

xpovision.com

kutkingbarbering.life

kppp-guxxz.xyz

chuckwagon-chow.com

la-casa-delle-vita.com

creativesocials.com

negociacoeshojebr.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2428
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:632
      • C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1988
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3812
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order.exe"
        3⤵
          PID:1340

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/632-116-0x0000000002EA0000-0x0000000002EFE000-memory.dmp
      Filesize

      376KB

    • memory/632-117-0x0000000009C70000-0x0000000009C71000-memory.dmp
      Filesize

      4KB

    • memory/632-118-0x0000000005490000-0x0000000005491000-memory.dmp
      Filesize

      4KB

    • memory/632-119-0x0000000002D60000-0x0000000002D61000-memory.dmp
      Filesize

      4KB

    • memory/632-120-0x0000000002F00000-0x0000000002F01000-memory.dmp
      Filesize

      4KB

    • memory/632-121-0x0000000005680000-0x0000000005682000-memory.dmp
      Filesize

      8KB

    • memory/632-122-0x0000000007810000-0x0000000007811000-memory.dmp
      Filesize

      4KB

    • memory/632-123-0x0000000005970000-0x00000000059EE000-memory.dmp
      Filesize

      504KB

    • memory/632-124-0x00000000058F0000-0x0000000005920000-memory.dmp
      Filesize

      192KB

    • memory/632-114-0x0000000000920000-0x0000000000921000-memory.dmp
      Filesize

      4KB

    • memory/1340-131-0x0000000000000000-mapping.dmp
    • memory/1988-125-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1988-127-0x0000000001760000-0x0000000001A80000-memory.dmp
      Filesize

      3.1MB

    • memory/1988-128-0x0000000001280000-0x0000000001294000-memory.dmp
      Filesize

      80KB

    • memory/1988-126-0x000000000041ED60-mapping.dmp
    • memory/2428-129-0x00000000064E0000-0x000000000665A000-memory.dmp
      Filesize

      1.5MB

    • memory/2428-136-0x0000000006660000-0x000000000677A000-memory.dmp
      Filesize

      1.1MB

    • memory/3812-130-0x0000000000000000-mapping.dmp
    • memory/3812-132-0x0000000001270000-0x000000000127C000-memory.dmp
      Filesize

      48KB

    • memory/3812-133-0x0000000000110000-0x000000000013E000-memory.dmp
      Filesize

      184KB

    • memory/3812-134-0x0000000000D40000-0x0000000001060000-memory.dmp
      Filesize

      3.1MB

    • memory/3812-135-0x0000000001060000-0x00000000010F3000-memory.dmp
      Filesize

      588KB