Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-07-2021 08:26

General

  • Target

    077869509# Invitation PQ Documents Submission QTN.pdf.exe

  • Size

    492KB

  • MD5

    18fa8099b62e8f056fe58725632b860d

  • SHA1

    34be165cd7bbf63732f599cccb666a0e3af3377e

  • SHA256

    9316b9fe5a317761f719e6ee8602f20b356cde2e5e566fdec0a388dc390b2bd0

  • SHA512

    eada997d7167c718a0d0154a269c1a9693cddad91e71055b93b3dc55cb08ad6df4e98c993fb0ed6475970306c5ab7bf46d66ebd1272226d777241021d646a876

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.headairload.com/jdge/

Decoy

cungcaptapvu.com

lantianren.net

mydivorcepsychologist.com

bageurapparel.com

citydealmaker.com

historyegress.com

litekkutu.xyz

perksofkerala.com

flairmax.com

washingmachineservicerepair.xyz

organicbeauty.club

rehmazbeauty.com

goodgly.com

imtheonlyperson.systems

shbanjia199.com

mwfbd.com

halsonpipe.com

0927487.com

perfectpeachco.com

danielprok.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)
  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2228
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:496
      • C:\Windows\SysWOW64\control.exe
        "C:\Windows\SysWOW64\control.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:996
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe"
          3⤵
            PID:1276

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/992-121-0x0000000006D40000-0x0000000006D41000-memory.dmp
        Filesize

        4KB

      • memory/992-123-0x0000000006610000-0x0000000006643000-memory.dmp
        Filesize

        204KB

      • memory/992-117-0x0000000004950000-0x0000000004951000-memory.dmp
        Filesize

        4KB

      • memory/992-118-0x0000000004940000-0x0000000004941000-memory.dmp
        Filesize

        4KB

      • memory/992-119-0x0000000004A10000-0x0000000004F0E000-memory.dmp
        Filesize

        5.0MB

      • memory/992-120-0x0000000004C90000-0x0000000004C92000-memory.dmp
        Filesize

        8KB

      • memory/992-116-0x0000000004F10000-0x0000000004F11000-memory.dmp
        Filesize

        4KB

      • memory/992-122-0x00000000066B0000-0x0000000006733000-memory.dmp
        Filesize

        524KB

      • memory/992-114-0x0000000000090000-0x0000000000091000-memory.dmp
        Filesize

        4KB

      • memory/996-136-0x0000000004940000-0x00000000049D3000-memory.dmp
        Filesize

        588KB

      • memory/996-131-0x0000000000000000-mapping.dmp
      • memory/996-135-0x0000000004580000-0x00000000048A0000-memory.dmp
        Filesize

        3.1MB

      • memory/996-134-0x0000000001000000-0x000000000102E000-memory.dmp
        Filesize

        184KB

      • memory/996-133-0x0000000001050000-0x0000000001070000-memory.dmp
        Filesize

        128KB

      • memory/1276-132-0x0000000000000000-mapping.dmp
      • memory/2228-125-0x000000000041EBA0-mapping.dmp
      • memory/2228-129-0x0000000003170000-0x0000000003184000-memory.dmp
        Filesize

        80KB

      • memory/2228-127-0x0000000001410000-0x0000000001424000-memory.dmp
        Filesize

        80KB

      • memory/2228-126-0x0000000001430000-0x0000000001750000-memory.dmp
        Filesize

        3.1MB

      • memory/2228-124-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/3020-130-0x0000000003090000-0x000000000316E000-memory.dmp
        Filesize

        888KB

      • memory/3020-128-0x0000000006C40000-0x0000000006DBD000-memory.dmp
        Filesize

        1.5MB

      • memory/3020-137-0x0000000006E60000-0x0000000006FB3000-memory.dmp
        Filesize

        1.3MB