Analysis

  • max time kernel
    151s
  • max time network
    114s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    15-09-2021 18:11

General

  • Target

    9284392fd96b31b3de8d8f664de3f0e4.exe

  • Size

    436KB

  • MD5

    9284392fd96b31b3de8d8f664de3f0e4

  • SHA1

    9b2e8d834a7e50ec7e674433d019dbd19996036c

  • SHA256

    4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7

  • SHA512

    61efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o4ms

C2

http://www.nocodehost.com/o4ms/

Decoy

fishingboatpub.com

trebor72.com

qualitycleanaustralia.com

amphilykenyx.com

jayte90.net

alveegrace.com

le-fleursoleil.com

volumoffer.com

businessbookwriters.com

alpin-art.com

firsttastetogo.com

catofc.com

ref-290.com

sbo2008.com

fortlauderdaleelevators.com

shanghaiyalian.com

majestybags.com

afcerd.com

myceliated.com

ls0a.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 11 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2536
    • C:\Users\Admin\AppData\Local\Temp\9284392fd96b31b3de8d8f664de3f0e4.exe
      "C:\Users\Admin\AppData\Local\Temp\9284392fd96b31b3de8d8f664de3f0e4.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:740
      • C:\Users\Admin\AppData\Local\Temp\9284392fd96b31b3de8d8f664de3f0e4.exe
        "C:\Users\Admin\AppData\Local\Temp\9284392fd96b31b3de8d8f664de3f0e4.exe"
        3⤵
          PID:1280
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 1280 -s 188
            4⤵
            • Program crash
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1512
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\browse\browse.exe'" /f
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2188
          • C:\Windows\SysWOW64\schtasks.exe
            schtasks /create /sc minute /mo 1 /tn "Nano" /tr "'C:\Users\Admin\AppData\Roaming\browse\browse.exe'" /f
            4⤵
            • Creates scheduled task(s)
            PID:1316
        • C:\Windows\SysWOW64\cmd.exe
          "C:\Windows\System32\cmd.exe" /c copy "C:\Users\Admin\AppData\Local\Temp\9284392fd96b31b3de8d8f664de3f0e4.exe" "C:\Users\Admin\AppData\Roaming\browse\browse.exe"
          3⤵
            PID:2576
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:2300
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:3036
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:3932
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:3700
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:1540
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:2252
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:3236
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:8
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:2976
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:3412
                            • C:\Windows\SysWOW64\autoconv.exe
                              "C:\Windows\SysWOW64\autoconv.exe"
                              2⤵
                                PID:2516
                              • C:\Windows\SysWOW64\autoconv.exe
                                "C:\Windows\SysWOW64\autoconv.exe"
                                2⤵
                                  PID:2100
                                • C:\Windows\SysWOW64\autoconv.exe
                                  "C:\Windows\SysWOW64\autoconv.exe"
                                  2⤵
                                    PID:2072
                                  • C:\Windows\SysWOW64\autoconv.exe
                                    "C:\Windows\SysWOW64\autoconv.exe"
                                    2⤵
                                      PID:2148
                                    • C:\Windows\SysWOW64\cmd.exe
                                      "C:\Windows\SysWOW64\cmd.exe"
                                      2⤵
                                      • Adds policy Run key to start application
                                      • Adds Run key to start application
                                      • Suspicious use of SetThreadContext
                                      • Modifies Internet Explorer settings
                                      • Suspicious behavior: EnumeratesProcesses
                                      • Suspicious behavior: MapViewOfSection
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:1440
                                      • C:\Program Files\Mozilla Firefox\Firefox.exe
                                        "C:\Program Files\Mozilla Firefox\Firefox.exe"
                                        3⤵
                                          PID:2232
                                    • C:\Users\Admin\AppData\Roaming\browse\browse.exe
                                      C:\Users\Admin\AppData\Roaming\browse\browse.exe
                                      1⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetThreadContext
                                      • Suspicious use of AdjustPrivilegeToken
                                      • Suspicious use of WriteProcessMemory
                                      PID:4024
                                      • C:\Users\Admin\AppData\Roaming\browse\browse.exe
                                        "C:\Users\Admin\AppData\Roaming\browse\browse.exe"
                                        2⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetThreadContext
                                        • Suspicious behavior: EnumeratesProcesses
                                        • Suspicious behavior: MapViewOfSection
                                        • Suspicious use of AdjustPrivilegeToken
                                        PID:416

                                    Network

                                    MITRE ATT&CK Matrix ATT&CK v6

                                    Execution

                                    Scheduled Task

                                    1
                                    T1053

                                    Persistence

                                    Registry Run Keys / Startup Folder

                                    2
                                    T1060

                                    Scheduled Task

                                    1
                                    T1053

                                    Privilege Escalation

                                    Scheduled Task

                                    1
                                    T1053

                                    Defense Evasion

                                    Modify Registry

                                    3
                                    T1112

                                    Credential Access

                                    Credentials in Files

                                    1
                                    T1081

                                    Discovery

                                    System Information Discovery

                                    1
                                    T1082

                                    Collection

                                    Data from Local System

                                    1
                                    T1005

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Roaming\browse\browse.exe
                                      MD5

                                      9284392fd96b31b3de8d8f664de3f0e4

                                      SHA1

                                      9b2e8d834a7e50ec7e674433d019dbd19996036c

                                      SHA256

                                      4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7

                                      SHA512

                                      61efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922

                                    • C:\Users\Admin\AppData\Roaming\browse\browse.exe
                                      MD5

                                      9284392fd96b31b3de8d8f664de3f0e4

                                      SHA1

                                      9b2e8d834a7e50ec7e674433d019dbd19996036c

                                      SHA256

                                      4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7

                                      SHA512

                                      61efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922

                                    • C:\Users\Admin\AppData\Roaming\browse\browse.exe
                                      MD5

                                      9284392fd96b31b3de8d8f664de3f0e4

                                      SHA1

                                      9b2e8d834a7e50ec7e674433d019dbd19996036c

                                      SHA256

                                      4f8799e5441c553ebbda342b6b06356a70dc432e5ac0434f4158146520b57ab7

                                      SHA512

                                      61efcc329ba8f50c32de43ba0bfc66e6591158c12fcb095dfa3652e54fc799255a49e44c62f2022b807d51b432050f85d94a172dc0e186af40a21e3848c7c922

                                    • memory/416-139-0x0000000001170000-0x0000000001490000-memory.dmp
                                      Filesize

                                      3.1MB

                                    • memory/416-140-0x0000000001150000-0x0000000001164000-memory.dmp
                                      Filesize

                                      80KB

                                    • memory/416-137-0x000000000041EAB0-mapping.dmp
                                    • memory/740-116-0x0000000005B40000-0x0000000005B41000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/740-117-0x00000000056E0000-0x00000000056E1000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/740-118-0x00000000057F0000-0x00000000057F1000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/740-119-0x0000000005630000-0x0000000005631000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/740-120-0x0000000005780000-0x0000000005781000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/740-114-0x00000000000D0000-0x00000000000D1000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/1280-122-0x000000000041EAB0-mapping.dmp
                                    • memory/1280-123-0x00000000001A0000-0x00000000001CE000-memory.dmp
                                      Filesize

                                      184KB

                                    • memory/1316-126-0x0000000000000000-mapping.dmp
                                    • memory/1440-143-0x00000000002F0000-0x0000000000349000-memory.dmp
                                      Filesize

                                      356KB

                                    • memory/1440-142-0x0000000000000000-mapping.dmp
                                    • memory/1440-144-0x00000000031B0000-0x00000000031DE000-memory.dmp
                                      Filesize

                                      184KB

                                    • memory/1440-145-0x00000000031E0000-0x000000000332A000-memory.dmp
                                      Filesize

                                      1.3MB

                                    • memory/1440-146-0x0000000003850000-0x00000000038E3000-memory.dmp
                                      Filesize

                                      588KB

                                    • memory/2188-124-0x0000000000000000-mapping.dmp
                                    • memory/2232-148-0x0000000000000000-mapping.dmp
                                    • memory/2536-141-0x0000000005570000-0x00000000056CE000-memory.dmp
                                      Filesize

                                      1.4MB

                                    • memory/2536-147-0x00000000056D0000-0x00000000057C7000-memory.dmp
                                      Filesize

                                      988KB

                                    • memory/2576-125-0x0000000000000000-mapping.dmp
                                    • memory/4024-135-0x0000000005470000-0x0000000005471000-memory.dmp
                                      Filesize

                                      4KB

                                    • memory/4024-129-0x0000000000A80000-0x0000000000A81000-memory.dmp
                                      Filesize

                                      4KB