Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    26-07-2021 22:48

General

  • Target

    PO91206762.exe

  • Size

    194KB

  • MD5

    54c6e68d889239ef978e4221f8add60f

  • SHA1

    500f8852aa4cf26eb57d544fa3017bbab75aafce

  • SHA256

    71cb97b67ebcc50a0bef217b3ca9591cfa49f6b8c8d11ee9952c2cde0b7b6a51

  • SHA512

    09d0bc694eababc0de157884383fff81c07b5c576bfcbfdf763b41b8a96a845b4fc29b04ccd0b82e70de085696f86afd79b94f2be210b545e0a91d0ffd793a7e

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.yjhlgg.com/grve/

Decoy

jrvinganimalexterminator.com

smallsyalls.com

po1c3.com

mencg.com

aussieenjoyment.today

espace22.com

aanmelding-desk.info

gallopshoes.com

nftsexy.com

ricosdulcesmexicanos.com

riseswift.com

thechicthirty.com

matdcg.com

alternet.today

creativehuesdesigns.com

rjkcrafts.com

lowdosemortgage.com

adoptahamster.com

wellness-sense.com

jacardcapital.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)
  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 26 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:2996
    • C:\Users\Admin\AppData\Local\Temp\PO91206762.exe
      "C:\Users\Admin\AppData\Local\Temp\PO91206762.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3908
      • C:\Users\Admin\AppData\Local\Temp\PO91206762.exe
        "C:\Users\Admin\AppData\Local\Temp\PO91206762.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3528
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PO91206762.exe"
        3⤵
          PID:3292

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1240-114-0x000000000041EAF0-mapping.dmp
    • memory/1240-120-0x0000000002750000-0x0000000002764000-memory.dmp
      Filesize

      80KB

    • memory/1240-116-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1240-117-0x0000000000A20000-0x0000000000D40000-memory.dmp
      Filesize

      3.1MB

    • memory/1240-118-0x0000000000570000-0x00000000006BA000-memory.dmp
      Filesize

      1.3MB

    • memory/2996-121-0x0000000004D10000-0x0000000004EB2000-memory.dmp
      Filesize

      1.6MB

    • memory/2996-119-0x0000000002740000-0x00000000027F1000-memory.dmp
      Filesize

      708KB

    • memory/2996-128-0x0000000004EC0000-0x0000000004F9C000-memory.dmp
      Filesize

      880KB

    • memory/3292-126-0x0000000000000000-mapping.dmp
    • memory/3528-122-0x0000000000000000-mapping.dmp
    • memory/3528-123-0x0000000000300000-0x0000000000327000-memory.dmp
      Filesize

      156KB

    • memory/3528-124-0x00000000001F0000-0x000000000021E000-memory.dmp
      Filesize

      184KB

    • memory/3528-125-0x00000000045A0000-0x00000000048C0000-memory.dmp
      Filesize

      3.1MB

    • memory/3528-127-0x0000000004370000-0x0000000004403000-memory.dmp
      Filesize

      588KB

    • memory/3908-115-0x0000000000410000-0x000000000055A000-memory.dmp
      Filesize

      1.3MB