Analysis

  • max time kernel
    147s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    04-10-2021 09:21

General

  • Target

    Lettera di restituzione per Siberia LLC.jpeg.exe

  • Size

    893KB

  • MD5

    6e2732d297f1666f6c9eed9de730c39e

  • SHA1

    54df8b2dc7352b75dd09103f2a399fde314e4e53

  • SHA256

    a93b39035f5ae1ace569c25759239f8c0361bf2462cb22f2a780c14de2821fe4

  • SHA512

    0ea8f7a145129ba54132b4833952b66783ade6d28cf9f551800018de6b946e661f7c903405e22136acd037335f43ae8668fd27a3419985f3f932e50b8e6d86d8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

C2

http://www.kmresults.com/n7ak/

Decoy

modischoolcbse.com

theneverwinter.com

rszkjx-vps-hosting.website

fnihil.com

1pbet.com

nnowzscorrez.com

uaotgvjl.icu

starmapsqatar.com

ekisilani.com

extradeepsheets.com

jam-nins.com

buranly.com

orixentertainment.com

rawtech.energy

myol.guru

utex.club

jiapie.com

wowig.store

wweidlyyl.com

systaskautomation.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 6 IoCs
  • Suspicious use of SendNotifyMessage 6 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\Lettera di restituzione per Siberia LLC.jpeg.exe
      "C:\Users\Admin\AppData\Local\Temp\Lettera di restituzione per Siberia LLC.jpeg.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\SysWOW64\logagent.exe
        C:\Windows\System32\logagent.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:664
        • C:\Windows\SysWOW64\raserver.exe
          "C:\Windows\SysWOW64\raserver.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\SysWOW64\logagent.exe"
            5⤵
              PID:1940
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:1460
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:628
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:612
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:1656
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:1804
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:2024
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:1820
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:1872
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:1912
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:816
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:1312
                            • C:\Windows\SysWOW64\autoconv.exe
                              "C:\Windows\SysWOW64\autoconv.exe"
                              2⤵
                                PID:1324
                              • C:\Windows\SysWOW64\autoconv.exe
                                "C:\Windows\SysWOW64\autoconv.exe"
                                2⤵
                                  PID:584
                                • C:\Windows\SysWOW64\autoconv.exe
                                  "C:\Windows\SysWOW64\autoconv.exe"
                                  2⤵
                                    PID:1924
                                  • C:\Windows\SysWOW64\autoconv.exe
                                    "C:\Windows\SysWOW64\autoconv.exe"
                                    2⤵
                                      PID:968
                                    • C:\Windows\SysWOW64\autoconv.exe
                                      "C:\Windows\SysWOW64\autoconv.exe"
                                      2⤵
                                        PID:856
                                      • C:\Windows\SysWOW64\autoconv.exe
                                        "C:\Windows\SysWOW64\autoconv.exe"
                                        2⤵
                                          PID:1468
                                        • C:\Windows\SysWOW64\autoconv.exe
                                          "C:\Windows\SysWOW64\autoconv.exe"
                                          2⤵
                                            PID:564

                                        Network

                                        MITRE ATT&CK Matrix

                                        Replay Monitor

                                        Loading Replay Monitor...

                                        Downloads

                                        • memory/664-60-0x00000000001C0000-0x00000000001D4000-memory.dmp
                                          Filesize

                                          80KB

                                        • memory/664-62-0x0000000000300000-0x0000000000314000-memory.dmp
                                          Filesize

                                          80KB

                                        • memory/664-56-0x0000000000000000-mapping.dmp
                                        • memory/664-57-0x0000000000090000-0x0000000000091000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/664-58-0x0000000072480000-0x00000000724AE000-memory.dmp
                                          Filesize

                                          184KB

                                        • memory/664-59-0x0000000002060000-0x0000000002363000-memory.dmp
                                          Filesize

                                          3.0MB

                                        • memory/1264-63-0x0000000007130000-0x00000000072CA000-memory.dmp
                                          Filesize

                                          1.6MB

                                        • memory/1264-61-0x0000000006AF0000-0x0000000006C7F000-memory.dmp
                                          Filesize

                                          1.6MB

                                        • memory/1264-71-0x0000000004280000-0x0000000004321000-memory.dmp
                                          Filesize

                                          644KB

                                        • memory/1356-53-0x0000000076A81000-0x0000000076A83000-memory.dmp
                                          Filesize

                                          8KB

                                        • memory/1356-54-0x00000000003C0000-0x00000000003C1000-memory.dmp
                                          Filesize

                                          4KB

                                        • memory/1880-64-0x0000000000000000-mapping.dmp
                                        • memory/1880-68-0x0000000000080000-0x00000000000AE000-memory.dmp
                                          Filesize

                                          184KB

                                        • memory/1880-69-0x0000000001FC0000-0x00000000022C3000-memory.dmp
                                          Filesize

                                          3.0MB

                                        • memory/1880-67-0x0000000000740000-0x000000000075C000-memory.dmp
                                          Filesize

                                          112KB

                                        • memory/1880-70-0x0000000001CF0000-0x0000000001D83000-memory.dmp
                                          Filesize

                                          588KB

                                        • memory/1940-66-0x0000000000000000-mapping.dmp