Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    20-08-2021 12:25

General

  • Target

    productos de calidad pdf.exe

  • Size

    1.0MB

  • MD5

    732a863df49b7ff21fcc5e334acb296f

  • SHA1

    ca761e7fdf3b189baaeecb323c4a850b1578b663

  • SHA256

    10fc322f518502524aad3ad5033204838dec25e07dec17646de39509b690747d

  • SHA512

    75fe65c36726b6996625201bdc1acdd405fa8abea6dc5a00daaed55af4394987a2799939dd9470e40a3af87128a77deca047e17959380be3b99d3e0820f1e51a

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

C2

http://www.kmresults.com/n7ak/

Decoy

modischoolcbse.com

theneverwinter.com

rszkjx-vps-hosting.website

fnihil.com

1pbet.com

nnowzscorrez.com

uaotgvjl.icu

starmapsqatar.com

ekisilani.com

extradeepsheets.com

jam-nins.com

buranly.com

orixentertainment.com

rawtech.energy

myol.guru

utex.club

jiapie.com

wowig.store

wweidlyyl.com

systaskautomation.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE FormBook CnC Checkin (POST) M2

    suricata: ET MALWARE FormBook CnC Checkin (POST) M2

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3052
    • C:\Users\Admin\AppData\Local\Temp\productos de calidad pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\productos de calidad pdf.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3736
      • C:\Program Files (x86)\internet explorer\ieinstal.exe
        "C:\Program Files (x86)\internet explorer\ieinstal.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3936
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:3184
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:3676
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:3500
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:3456
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:1528
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:2268
                • C:\Windows\SysWOW64\ipconfig.exe
                  "C:\Windows\SysWOW64\ipconfig.exe"
                  2⤵
                  • Adds policy Run key to start application
                  • Adds Run key to start application
                  • Suspicious use of SetThreadContext
                  • Gathers network information
                  • Modifies Internet Explorer settings
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:3352
                  • C:\Program Files\Mozilla Firefox\Firefox.exe
                    "C:\Program Files\Mozilla Firefox\Firefox.exe"
                    3⤵
                      PID:3940

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Command-Line Interface

                1
                T1059

                Persistence

                Registry Run Keys / Startup Folder

                2
                T1060

                Defense Evasion

                Modify Registry

                3
                T1112

                Discovery

                System Information Discovery

                1
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologim.jpeg
                  MD5

                  de7261538171d4e3acaf8440d1fe73c0

                  SHA1

                  55da0f3c68707d8faf3914bfafd0ce7cf1e59c66

                  SHA256

                  fdb039991b0934269d11da5a8ddfb0870b8d5797a9ad31567a2d650bb3c085ad

                  SHA512

                  9e1ae52511d04a0b7a642bfdd7ba059fcb5efff84fcc7886d61d803a036409ecaafca9ec3e12ef05175fc97b26f883d0daf402e165a857225d7147792d20b876

                • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrf.ini
                  MD5

                  2f245469795b865bdd1b956c23d7893d

                  SHA1

                  6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

                  SHA256

                  1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

                  SHA512

                  909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

                • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologri.ini
                  MD5

                  d63a82e5d81e02e399090af26db0b9cb

                  SHA1

                  91d0014c8f54743bba141fd60c9d963f869d76c9

                  SHA256

                  eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

                  SHA512

                  38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

                • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrv.ini
                  MD5

                  bbc41c78bae6c71e63cb544a6a284d94

                  SHA1

                  33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

                  SHA256

                  ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

                  SHA512

                  0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

                • memory/3052-126-0x0000000004FD0000-0x000000000513A000-memory.dmp
                  Filesize

                  1.4MB

                • memory/3052-120-0x0000000005F50000-0x0000000006021000-memory.dmp
                  Filesize

                  836KB

                • memory/3352-121-0x0000000000000000-mapping.dmp
                • memory/3352-123-0x0000000000B50000-0x0000000000B7E000-memory.dmp
                  Filesize

                  184KB

                • memory/3352-122-0x0000000000DB0000-0x0000000000DBB000-memory.dmp
                  Filesize

                  44KB

                • memory/3352-124-0x00000000034C0000-0x00000000037E0000-memory.dmp
                  Filesize

                  3.1MB

                • memory/3352-125-0x0000000003320000-0x00000000033B3000-memory.dmp
                  Filesize

                  588KB

                • memory/3736-114-0x00000000006B0000-0x00000000006B1000-memory.dmp
                  Filesize

                  4KB

                • memory/3936-118-0x0000000005040000-0x0000000005360000-memory.dmp
                  Filesize

                  3.1MB

                • memory/3936-119-0x0000000004F20000-0x0000000004F34000-memory.dmp
                  Filesize

                  80KB

                • memory/3936-116-0x0000000002F90000-0x0000000002F91000-memory.dmp
                  Filesize

                  4KB

                • memory/3936-117-0x0000000010410000-0x000000001043E000-memory.dmp
                  Filesize

                  184KB

                • memory/3936-115-0x0000000000000000-mapping.dmp
                • memory/3940-127-0x0000000000000000-mapping.dmp
                • memory/3940-129-0x000001F8563B0000-0x000001F8564B3000-memory.dmp
                  Filesize

                  1.0MB

                • memory/3940-128-0x00007FF6A58F0000-0x00007FF6A5983000-memory.dmp
                  Filesize

                  588KB