Analysis

  • max time kernel
    148s
  • max time network
    167s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    26-07-2021 08:26

General

  • Target

    077869509# Invitation PQ Documents Submission QTN.pdf.exe

  • Size

    492KB

  • MD5

    18fa8099b62e8f056fe58725632b860d

  • SHA1

    34be165cd7bbf63732f599cccb666a0e3af3377e

  • SHA256

    9316b9fe5a317761f719e6ee8602f20b356cde2e5e566fdec0a388dc390b2bd0

  • SHA512

    eada997d7167c718a0d0154a269c1a9693cddad91e71055b93b3dc55cb08ad6df4e98c993fb0ed6475970306c5ab7bf46d66ebd1272226d777241021d646a876

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.headairload.com/jdge/

Decoy

cungcaptapvu.com

lantianren.net

mydivorcepsychologist.com

bageurapparel.com

citydealmaker.com

historyegress.com

litekkutu.xyz

perksofkerala.com

flairmax.com

washingmachineservicerepair.xyz

organicbeauty.club

rehmazbeauty.com

goodgly.com

imtheonlyperson.systems

shbanjia199.com

mwfbd.com

halsonpipe.com

0927487.com

perfectpeachco.com

danielprok.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)
  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1180
      • C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:548
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:860
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:1128
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:1516
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:576
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:996
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:984
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:824
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:864
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:324
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:1972
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:1752
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:328
                            • C:\Windows\SysWOW64\cmmon32.exe
                              "C:\Windows\SysWOW64\cmmon32.exe"
                              2⤵
                              • Suspicious use of SetThreadContext
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious behavior: MapViewOfSection
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:884
                              • C:\Windows\SysWOW64\cmd.exe
                                /c del "C:\Users\Admin\AppData\Local\Temp\077869509# Invitation PQ Documents Submission QTN.pdf.exe"
                                3⤵
                                • Deletes itself
                                PID:1676

                          Network

                          MITRE ATT&CK Matrix

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • memory/548-65-0x0000000000400000-0x000000000042E000-memory.dmp
                            Filesize

                            184KB

                          • memory/548-67-0x0000000000A40000-0x0000000000D43000-memory.dmp
                            Filesize

                            3.0MB

                          • memory/548-68-0x0000000000210000-0x0000000000224000-memory.dmp
                            Filesize

                            80KB

                          • memory/548-66-0x000000000041EBA0-mapping.dmp
                          • memory/884-72-0x0000000000120000-0x000000000014E000-memory.dmp
                            Filesize

                            184KB

                          • memory/884-70-0x0000000000000000-mapping.dmp
                          • memory/884-71-0x0000000000610000-0x000000000061D000-memory.dmp
                            Filesize

                            52KB

                          • memory/884-74-0x0000000002010000-0x0000000002313000-memory.dmp
                            Filesize

                            3.0MB

                          • memory/884-75-0x0000000001D40000-0x0000000001DD3000-memory.dmp
                            Filesize

                            588KB

                          • memory/1180-64-0x0000000001E80000-0x0000000001EB3000-memory.dmp
                            Filesize

                            204KB

                          • memory/1180-63-0x0000000005140000-0x00000000051C3000-memory.dmp
                            Filesize

                            524KB

                          • memory/1180-62-0x0000000000320000-0x0000000000322000-memory.dmp
                            Filesize

                            8KB

                          • memory/1180-61-0x0000000004E20000-0x0000000004E21000-memory.dmp
                            Filesize

                            4KB

                          • memory/1180-59-0x00000000009B0000-0x00000000009B1000-memory.dmp
                            Filesize

                            4KB

                          • memory/1288-69-0x0000000003BD0000-0x0000000003CCD000-memory.dmp
                            Filesize

                            1012KB

                          • memory/1288-76-0x00000000064A0000-0x00000000065C4000-memory.dmp
                            Filesize

                            1.1MB

                          • memory/1676-73-0x0000000000000000-mapping.dmp