Analysis

  • max time kernel
    145s
  • max time network
    187s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    29-09-2021 13:13

General

  • Target

    PURCHASE ORDER 29kva.exe

  • Size

    713KB

  • MD5

    cf92b80bd587ac1498dd3e37fee96af7

  • SHA1

    ecaef1532016cc58333ddff64ace07d2a51bde72

  • SHA256

    727d99fbf5a7d58b50ea62f289cf59b251ffe3e6f5d9487f7716127654e6e32a

  • SHA512

    cd07ba0d3b511144afd2246778103ac1ce9db31f9df6ac7dd86c3a08600682242cf1069a54e36da7e96041d084aed950e5d899510f08a676434848fe8f350fb3

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ergs

C2

http://www.iselotech.com/ergs/

Decoy

oceanprimesanfrancisco.com

dk-tnc.com

sodangwang.com

abrat-ed.com

dusubiqiqijem.xyz

getsup.online

homeneto.com

shose8.com

tronlane.com

nidowicosasod.xyz

independienteatleticclub.com

pca-winschool.com

realbadnastystories.site

bluevioletfloral.com

simplifiedpeacepodcast.com

abcfreediving.com

theyardbunny.com

holoique.com

ibkr1325.com

tjnfioou.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1224
    • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 29kva.exe
      "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 29kva.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 29kva.exe
        "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 29kva.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1832
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1652
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\PURCHASE ORDER 29kva.exe"
        3⤵
        • Deletes itself
        PID:1712

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1224-70-0x0000000002AB0000-0x0000000002BCF000-memory.dmp
    Filesize

    1.1MB

  • memory/1224-78-0x0000000004250000-0x000000000433A000-memory.dmp
    Filesize

    936KB

  • memory/1652-77-0x0000000001F30000-0x0000000001FC4000-memory.dmp
    Filesize

    592KB

  • memory/1652-75-0x0000000002120000-0x0000000002423000-memory.dmp
    Filesize

    3.0MB

  • memory/1652-74-0x00000000000E0000-0x000000000010F000-memory.dmp
    Filesize

    188KB

  • memory/1652-73-0x00000000003E0000-0x00000000004E4000-memory.dmp
    Filesize

    1.0MB

  • memory/1652-72-0x00000000767B1000-0x00000000767B3000-memory.dmp
    Filesize

    8KB

  • memory/1652-71-0x0000000000000000-mapping.dmp
  • memory/1712-76-0x0000000000000000-mapping.dmp
  • memory/1832-68-0x0000000000B10000-0x0000000000E13000-memory.dmp
    Filesize

    3.0MB

  • memory/1832-69-0x0000000000190000-0x00000000001A5000-memory.dmp
    Filesize

    84KB

  • memory/1832-67-0x000000000041F1C0-mapping.dmp
  • memory/1832-66-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1988-59-0x0000000000A50000-0x0000000000A51000-memory.dmp
    Filesize

    4KB

  • memory/1988-65-0x0000000001FB0000-0x0000000001FEF000-memory.dmp
    Filesize

    252KB

  • memory/1988-64-0x0000000000690000-0x0000000000692000-memory.dmp
    Filesize

    8KB

  • memory/1988-63-0x0000000005E40000-0x0000000005EAF000-memory.dmp
    Filesize

    444KB

  • memory/1988-62-0x00000000005E0000-0x00000000005F3000-memory.dmp
    Filesize

    76KB

  • memory/1988-61-0x0000000004CD0000-0x0000000004CD1000-memory.dmp
    Filesize

    4KB