Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    27-07-2021 06:47

General

  • Target

    RFQ-BHI-PP-IN-301 PROJECT MaterialsEquipements Request for Quotation_HMD PJT.exe

  • Size

    1.1MB

  • MD5

    32a7f5eccb743dc2645f642cf109690a

  • SHA1

    d73a4e4f6b5560cd1f21978a40265d480ef24259

  • SHA256

    4cb3b507b091eafd3faf47a7ebb23e597d92b1cd4ad1655f6a0a9330768a60e5

  • SHA512

    f590c392efe24e998aa5604bc8e03de3aafd69173e5b378612b561311c5c38620c0895811aff71320f98cc543cfe6d8643e67920822838b4fabed2c9b404f546

Malware Config

Extracted

Family

formbook

Version

4.1

C2

http://www.sunderstudios.com/blo/

Decoy

introducingsadieann.com

batterrydaddy.com

restaurantechoytac.digital

toriox.tech

cursosonline.pro

onegreenmother.com

canyonpark-home.com

charleserick9.com

coldavis-81720-1634.com

deliandgyros.com

darrenjmajor.com

chekax.com

twinsepower.com

welinkautollc.com

kimlmontgomery.com

ligature.net

bllbirdcrk.com

happilyeverfi.com

hahdigitalmarketinghelp.com

onecomcall.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)
  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2900
    • C:\Users\Admin\AppData\Local\Temp\RFQ-BHI-PP-IN-301 PROJECT MaterialsEquipements Request for Quotation_HMD PJT.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ-BHI-PP-IN-301 PROJECT MaterialsEquipements Request for Quotation_HMD PJT.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4796
      • C:\Users\Admin\AppData\Local\Temp\RFQ-BHI-PP-IN-301 PROJECT MaterialsEquipements Request for Quotation_HMD PJT.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ-BHI-PP-IN-301 PROJECT MaterialsEquipements Request for Quotation_HMD PJT.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:812
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:396
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\RFQ-BHI-PP-IN-301 PROJECT MaterialsEquipements Request for Quotation_HMD PJT.exe"
        3⤵
          PID:1056

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/396-130-0x0000000000000000-mapping.dmp
    • memory/396-135-0x0000000004D30000-0x0000000004DC3000-memory.dmp
      Filesize

      588KB

    • memory/396-134-0x0000000004EA0000-0x00000000051C0000-memory.dmp
      Filesize

      3.1MB

    • memory/396-132-0x0000000000A20000-0x0000000000A3F000-memory.dmp
      Filesize

      124KB

    • memory/396-133-0x0000000003210000-0x000000000323E000-memory.dmp
      Filesize

      184KB

    • memory/812-125-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/812-127-0x0000000001AF0000-0x0000000001E10000-memory.dmp
      Filesize

      3.1MB

    • memory/812-128-0x0000000001580000-0x00000000016CA000-memory.dmp
      Filesize

      1.3MB

    • memory/812-126-0x000000000041EB40-mapping.dmp
    • memory/1056-131-0x0000000000000000-mapping.dmp
    • memory/2900-136-0x0000000006890000-0x00000000069D2000-memory.dmp
      Filesize

      1.3MB

    • memory/2900-129-0x0000000006420000-0x00000000065BC000-memory.dmp
      Filesize

      1.6MB

    • memory/4796-114-0x0000000000F10000-0x0000000000F11000-memory.dmp
      Filesize

      4KB

    • memory/4796-121-0x00000000062D0000-0x00000000062D1000-memory.dmp
      Filesize

      4KB

    • memory/4796-124-0x00000000017E0000-0x000000000183C000-memory.dmp
      Filesize

      368KB

    • memory/4796-120-0x0000000005B60000-0x0000000005B61000-memory.dmp
      Filesize

      4KB

    • memory/4796-123-0x0000000005BC0000-0x0000000005BC4000-memory.dmp
      Filesize

      16KB

    • memory/4796-119-0x00000000058E0000-0x00000000058E1000-memory.dmp
      Filesize

      4KB

    • memory/4796-118-0x0000000005970000-0x0000000005971000-memory.dmp
      Filesize

      4KB

    • memory/4796-117-0x0000000005DD0000-0x0000000005DD1000-memory.dmp
      Filesize

      4KB

    • memory/4796-116-0x0000000005830000-0x0000000005831000-memory.dmp
      Filesize

      4KB

    • memory/4796-122-0x00000000058D0000-0x0000000005DCE000-memory.dmp
      Filesize

      5.0MB