Analysis

  • max time kernel
    151s
  • max time network
    151s
  • platform
    windows10_x64
  • resource
    win10v20210408
  • submitted
    04-10-2021 09:21

General

  • Target

    Lettera di restituzione per Siberia LLC.jpeg.exe

  • Size

    893KB

  • MD5

    6e2732d297f1666f6c9eed9de730c39e

  • SHA1

    54df8b2dc7352b75dd09103f2a399fde314e4e53

  • SHA256

    a93b39035f5ae1ace569c25759239f8c0361bf2462cb22f2a780c14de2821fe4

  • SHA512

    0ea8f7a145129ba54132b4833952b66783ade6d28cf9f551800018de6b946e661f7c903405e22136acd037335f43ae8668fd27a3419985f3f932e50b8e6d86d8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

C2

http://www.kmresults.com/n7ak/

Decoy

modischoolcbse.com

theneverwinter.com

rszkjx-vps-hosting.website

fnihil.com

1pbet.com

nnowzscorrez.com

uaotgvjl.icu

starmapsqatar.com

ekisilani.com

extradeepsheets.com

jam-nins.com

buranly.com

orixentertainment.com

rawtech.energy

myol.guru

utex.club

jiapie.com

wowig.store

wweidlyyl.com

systaskautomation.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3024
    • C:\Users\Admin\AppData\Local\Temp\Lettera di restituzione per Siberia LLC.jpeg.exe
      "C:\Users\Admin\AppData\Local\Temp\Lettera di restituzione per Siberia LLC.jpeg.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:900
      • C:\Windows\SysWOW64\mobsync.exe
        C:\Windows\System32\mobsync.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1168
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\mobsync.exe"
        3⤵
          PID:1428

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/900-114-0x0000000002310000-0x0000000002311000-memory.dmp
      Filesize

      4KB

    • memory/1168-120-0x0000000004E40000-0x0000000004E54000-memory.dmp
      Filesize

      80KB

    • memory/1168-118-0x0000000073D80000-0x0000000073DAE000-memory.dmp
      Filesize

      184KB

    • memory/1168-117-0x00000000030B0000-0x00000000030B1000-memory.dmp
      Filesize

      4KB

    • memory/1168-119-0x0000000004F90000-0x00000000052B0000-memory.dmp
      Filesize

      3.1MB

    • memory/1168-116-0x0000000000000000-mapping.dmp
    • memory/1324-122-0x0000000000000000-mapping.dmp
    • memory/1324-124-0x0000000001520000-0x000000000153E000-memory.dmp
      Filesize

      120KB

    • memory/1324-125-0x0000000000750000-0x000000000077E000-memory.dmp
      Filesize

      184KB

    • memory/1324-126-0x0000000003540000-0x0000000003860000-memory.dmp
      Filesize

      3.1MB

    • memory/1324-127-0x0000000001160000-0x00000000011F3000-memory.dmp
      Filesize

      588KB

    • memory/1428-123-0x0000000000000000-mapping.dmp
    • memory/3024-121-0x0000000004DA0000-0x0000000004E7F000-memory.dmp
      Filesize

      892KB

    • memory/3024-128-0x0000000002630000-0x00000000026E5000-memory.dmp
      Filesize

      724KB