Analysis

  • max time kernel
    150s
  • max time network
    156s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    26-07-2021 14:02

General

  • Target

    Douane nécessaire.scr

  • Size

    1.3MB

  • MD5

    02a16ecb920577998a4964a4eb9e2ad1

  • SHA1

    8b8d43fd5b6aa6c925bb8dd9beca3ec7d10aae58

  • SHA256

    c327a9bad9c1f25d9da900eb60b3ef7a0387d232c30bebb4d8b4b1bb62e257fb

  • SHA512

    54b59deda69c278c9056ba294aa9549a47b9324e93c1735abf09231925d43a47830d45977d0b3250941d80d903e44b809cb2761de621bbc220d86e0793ea53be

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.celinehair.com/e7hf/

Decoy

miaozhunjingzhijia.com

mindplayva.com

vbetturkey.com

panevnyk.space

philiprankinemarketing.com

rosascleaningpros.com

nadersadek.info

2of237woodlandstreet.com

thegroomingdrs.com

cloudtrending.com

viajenscomcafe.com

medkomp.online

hohlola.com

ksremy.com

watermarkwpb.com

work4villageinn.com

pollmag.com

organizingbypaty.com

awakenwithrochelle.com

walcottstreetdental.site

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)
  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\Douane nécessaire.scr
      "C:\Users\Admin\AppData\Local\Temp\Douane nécessaire.scr" /S
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4652
      • C:\Users\Admin\AppData\Local\Temp\Douane nécessaire.scr
        "C:\Users\Admin\AppData\Local\Temp\Douane nécessaire.scr"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3132
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:4192
      • C:\Windows\SysWOW64\rundll32.exe
        "C:\Windows\SysWOW64\rundll32.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4204
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Douane nécessaire.scr"
          3⤵
            PID:4176

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/3048-136-0x0000000006280000-0x00000000063FC000-memory.dmp
        Filesize

        1.5MB

      • memory/3048-129-0x0000000006150000-0x0000000006275000-memory.dmp
        Filesize

        1.1MB

      • memory/3132-125-0x0000000000400000-0x000000000042E000-memory.dmp
        Filesize

        184KB

      • memory/3132-127-0x0000000001290000-0x00000000015B0000-memory.dmp
        Filesize

        3.1MB

      • memory/3132-128-0x0000000001050000-0x0000000001064000-memory.dmp
        Filesize

        80KB

      • memory/3132-126-0x000000000041ED90-mapping.dmp
      • memory/4176-131-0x0000000000000000-mapping.dmp
      • memory/4204-130-0x0000000000000000-mapping.dmp
      • memory/4204-133-0x0000000002900000-0x000000000292E000-memory.dmp
        Filesize

        184KB

      • memory/4204-135-0x0000000004620000-0x00000000046B3000-memory.dmp
        Filesize

        588KB

      • memory/4204-134-0x0000000004300000-0x0000000004620000-memory.dmp
        Filesize

        3.1MB

      • memory/4204-132-0x0000000000110000-0x0000000000123000-memory.dmp
        Filesize

        76KB

      • memory/4652-121-0x0000000005670000-0x0000000005671000-memory.dmp
        Filesize

        4KB

      • memory/4652-119-0x00000000054A0000-0x000000000599E000-memory.dmp
        Filesize

        5.0MB

      • memory/4652-118-0x00000000054A0000-0x00000000054A1000-memory.dmp
        Filesize

        4KB

      • memory/4652-114-0x0000000000A30000-0x0000000000A31000-memory.dmp
        Filesize

        4KB

      • memory/4652-117-0x00000000059A0000-0x00000000059A1000-memory.dmp
        Filesize

        4KB

      • memory/4652-120-0x0000000005380000-0x0000000005381000-memory.dmp
        Filesize

        4KB

      • memory/4652-123-0x0000000006B40000-0x0000000006BB9000-memory.dmp
        Filesize

        484KB

      • memory/4652-122-0x00000000053E0000-0x00000000053EB000-memory.dmp
        Filesize

        44KB

      • memory/4652-124-0x0000000006BD0000-0x0000000006C05000-memory.dmp
        Filesize

        212KB

      • memory/4652-116-0x0000000005400000-0x0000000005401000-memory.dmp
        Filesize

        4KB