Resubmissions

10-09-2021 08:20

210910-j8pmascghq 10

10-09-2021 06:36

210910-hdazzscfhk 10

Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-en
  • submitted
    10-09-2021 08:20

General

  • Target

    10000.exe

  • Size

    184KB

  • MD5

    c1a7af5210aa95abf7a60c9234edfef3

  • SHA1

    775030fd15d38116673a8758ececd8e091a4dc86

  • SHA256

    dd825f982712b6519ee45d665ca88adbabba747f45c645b8caeada2d8fe79b38

  • SHA512

    85ee399b7a2fad74c69f55ecdd781407adce29fcdb585abaf32dc2123f7b29d0f048cfb0cdaf598139742ccec3c27d60dc89e2d52020dba9224d7ca883e86139

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

C2

http://www.jakesplacebarbers.com/3nop/

Decoy

videohm.com

panache-rose.com

alnooncars-kw.com

trueblue2u.com

brussels-cafe.com

ip2c.net

influenzerr.com

rbcoq.com

zzful.com

drainthe.com

sumaholesson.com

cursosaprovados.com

genotecinc.com

dbrulhart.com

theapiarystudios.com

kensyu-kan.com

dkku88.com

tikhyper.com

aztecnort.com

homebrim.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3012
    • C:\Users\Admin\AppData\Local\Temp\10000.exe
      "C:\Users\Admin\AppData\Local\Temp\10000.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3956
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2364
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:2356
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:2436
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            2⤵
              PID:2472
            • C:\Windows\SysWOW64\autofmt.exe
              "C:\Windows\SysWOW64\autofmt.exe"
              2⤵
                PID:2476
              • C:\Windows\SysWOW64\autofmt.exe
                "C:\Windows\SysWOW64\autofmt.exe"
                2⤵
                  PID:2540
                • C:\Windows\SysWOW64\autofmt.exe
                  "C:\Windows\SysWOW64\autofmt.exe"
                  2⤵
                    PID:2556
                  • C:\Windows\SysWOW64\autofmt.exe
                    "C:\Windows\SysWOW64\autofmt.exe"
                    2⤵
                      PID:2580
                    • C:\Windows\SysWOW64\autofmt.exe
                      "C:\Windows\SysWOW64\autofmt.exe"
                      2⤵
                        PID:2684
                      • C:\Windows\SysWOW64\NETSTAT.EXE
                        "C:\Windows\SysWOW64\NETSTAT.EXE"
                        2⤵
                        • Suspicious use of SetThreadContext
                        • Gathers network information
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious behavior: MapViewOfSection
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:3380
                        • C:\Windows\SysWOW64\cmd.exe
                          /c del "C:\Users\Admin\AppData\Local\Temp\10000.exe"
                          3⤵
                            PID:1704

                      Network

                      MITRE ATT&CK Matrix ATT&CK v6

                      Execution

                      Command-Line Interface

                      1
                      T1059

                      Discovery

                      System Information Discovery

                      1
                      T1082

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • memory/1704-123-0x0000000000000000-mapping.dmp
                      • memory/3012-117-0x0000000006010000-0x0000000006144000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/3012-119-0x0000000006150000-0x000000000629C000-memory.dmp
                        Filesize

                        1.3MB

                      • memory/3012-126-0x00000000062A0000-0x00000000063DD000-memory.dmp
                        Filesize

                        1.2MB

                      • memory/3380-120-0x0000000000000000-mapping.dmp
                      • memory/3380-121-0x0000000000AD0000-0x0000000000ADB000-memory.dmp
                        Filesize

                        44KB

                      • memory/3380-122-0x0000000003010000-0x000000000303E000-memory.dmp
                        Filesize

                        184KB

                      • memory/3380-124-0x00000000035E0000-0x0000000003900000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/3380-125-0x0000000003440000-0x00000000034D3000-memory.dmp
                        Filesize

                        588KB

                      • memory/3956-115-0x00000000012A0000-0x00000000015C0000-memory.dmp
                        Filesize

                        3.1MB

                      • memory/3956-116-0x0000000000CF0000-0x0000000000D04000-memory.dmp
                        Filesize

                        80KB

                      • memory/3956-118-0x00000000011B0000-0x00000000011C4000-memory.dmp
                        Filesize

                        80KB