Analysis

  • max time kernel
    151s
  • max time network
    184s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    11-10-2021 06:54

General

  • Target

    BOM Contracting and General Supplies.js

  • Size

    22KB

  • MD5

    81a0010758bb3da2796a7506bfd4aab3

  • SHA1

    ffc61c27e1a58878878e7b2b44c97ec23c0e09d2

  • SHA256

    3f82447c548d6d623ddc3f9965363df07f52cdf8eda955c55332196ee409e4c6

  • SHA512

    9521ed85e7a83eb890f706add3da9c29d29bd5c5b4a535541df9eb4072f4944fff34643289955ddf37be16f3cf815a8f77392cc656c0bb85506211ec28680779

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k9d0

C2

http://www.dotgroup-email.com/k9d0/

Decoy

flourishpodcast.xyz

xn--nga.group

music-tomato.com

motory.store

arrivehike.info

xn--diseowebseo-4db.com

centpourcentsons.com

qnnjja005.xyz

annielynnrose.com

darlaevans.com

door-maximum.com

chinataibaifen.com

stickerhicks.com

ta2gamesstudio.com

jendelanews.com

milestoneneuro.com

premierconciergehomes.com

exitcounter.com

jrsway.com

famurainmobiliaria.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

    suricata: ET MALWARE Terse alphanumeric executable downloader high likelihood of being hostile

  • Formbook Payload 4 IoCs
  • Blocklisted process makes network request 20 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 3 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies system certificate store 2 TTPs 5 IoCs
  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 4 IoCs
  • Suspicious use of SendNotifyMessage 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Windows\system32\wscript.exe
      wscript.exe "C:\Users\Admin\AppData\Local\Temp\BOM Contracting and General Supplies.js"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of WriteProcessMemory
      PID:1860
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\dkzxEsqUMq.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        PID:1956
      • C:\Users\Admin\AppData\Local\Temp\un.exe
        "C:\Users\Admin\AppData\Local\Temp\un.exe"
        3⤵
        • Executes dropped EXE
        • Drops startup file
        • Loads dropped DLL
        • Modifies system certificate store
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1508
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe,"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1836
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe,"
            5⤵
            • Modifies WinLogon for persistence
            PID:1516
        • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe
          "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Modifies system certificate store
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2028
          • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
            "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:816
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:388
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe"
        3⤵
          PID:1652

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Winlogon Helper DLL

    1
    T1004

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
      MD5

      b15e317b09321eaee14148808dc05492

      SHA1

      9c435e4c3bc9577d01d92be91ba5688b12bfa570

      SHA256

      d1e6796b0c9b9d66d35219739e46993ae91f788f864ef4c74ced0d7b370f4ba2

      SHA512

      7f78fba5ea578aaec2c26075b912b4e2abfdb8929bd671590ced7969f5e828909f45d40e14ed0a8c93422c0d58374ac0d10d9143783559338e84cfa5031a3ccb

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • C:\Users\Admin\AppData\Local\Temp\un.exe
      MD5

      c8199355d0ca0fe289ea4d1ee018ff47

      SHA1

      ac0428f426c0bda431bd80f6abab183ccd484d07

      SHA256

      127262efb50609596b0597f1f357d75ff1dca0a0519fd8805d4fac1b288abae7

      SHA512

      0f1f70ef0bbfa75b53a57549ef170d493b2706bbb8c41c2288fb831ace0dce902e6b9fa97834baf4b0adaa995df3767318055ad43b5bd366bbe257678f1da395

    • C:\Users\Admin\AppData\Local\Temp\un.exe
      MD5

      c8199355d0ca0fe289ea4d1ee018ff47

      SHA1

      ac0428f426c0bda431bd80f6abab183ccd484d07

      SHA256

      127262efb50609596b0597f1f357d75ff1dca0a0519fd8805d4fac1b288abae7

      SHA512

      0f1f70ef0bbfa75b53a57549ef170d493b2706bbb8c41c2288fb831ace0dce902e6b9fa97834baf4b0adaa995df3767318055ad43b5bd366bbe257678f1da395

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe
      MD5

      c8199355d0ca0fe289ea4d1ee018ff47

      SHA1

      ac0428f426c0bda431bd80f6abab183ccd484d07

      SHA256

      127262efb50609596b0597f1f357d75ff1dca0a0519fd8805d4fac1b288abae7

      SHA512

      0f1f70ef0bbfa75b53a57549ef170d493b2706bbb8c41c2288fb831ace0dce902e6b9fa97834baf4b0adaa995df3767318055ad43b5bd366bbe257678f1da395

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe
      MD5

      c8199355d0ca0fe289ea4d1ee018ff47

      SHA1

      ac0428f426c0bda431bd80f6abab183ccd484d07

      SHA256

      127262efb50609596b0597f1f357d75ff1dca0a0519fd8805d4fac1b288abae7

      SHA512

      0f1f70ef0bbfa75b53a57549ef170d493b2706bbb8c41c2288fb831ace0dce902e6b9fa97834baf4b0adaa995df3767318055ad43b5bd366bbe257678f1da395

    • C:\Users\Admin\AppData\Roaming\dkzxEsqUMq.js
      MD5

      518e6b1ff0aa8ceb28ec463e15dbe880

      SHA1

      7ec70e887b02f1fe669c7611324e24f3869aee55

      SHA256

      f65e6b154131aed1c0d1a380a85b77829f57243e659a1eeffc67efd2b5640704

      SHA512

      30048b1575e91bb92b432989ab7d3ec18844fc43c5549f828d93c3250aae429fd238f8daf2c45605363a5a38b7b31403e574c442b64c44e470df10deb876d3e6

    • \Users\Admin\AppData\Local\Temp\AddInProcess32.exe
      MD5

      6a673bfc3b67ae9782cb31af2f234c68

      SHA1

      7544e89566d91e84e3cd437b9a073e5f6b56566e

      SHA256

      978a4093058aa2ebf05dc353897d90d950324389879b57741b64160825b5ec0e

      SHA512

      72c302372ce87ceda2a3c70a6005d3f9c112f1641bc7fe6824c718971233e66c07e2996d2785fa358566c38714c25ea812c05c7cfd2f588284849d495fd24f39

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe
      MD5

      c8199355d0ca0fe289ea4d1ee018ff47

      SHA1

      ac0428f426c0bda431bd80f6abab183ccd484d07

      SHA256

      127262efb50609596b0597f1f357d75ff1dca0a0519fd8805d4fac1b288abae7

      SHA512

      0f1f70ef0bbfa75b53a57549ef170d493b2706bbb8c41c2288fb831ace0dce902e6b9fa97834baf4b0adaa995df3767318055ad43b5bd366bbe257678f1da395

    • \Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Windows Desktop.exe
      MD5

      c8199355d0ca0fe289ea4d1ee018ff47

      SHA1

      ac0428f426c0bda431bd80f6abab183ccd484d07

      SHA256

      127262efb50609596b0597f1f357d75ff1dca0a0519fd8805d4fac1b288abae7

      SHA512

      0f1f70ef0bbfa75b53a57549ef170d493b2706bbb8c41c2288fb831ace0dce902e6b9fa97834baf4b0adaa995df3767318055ad43b5bd366bbe257678f1da395

    • memory/388-105-0x0000000000560000-0x00000000005F3000-memory.dmp
      Filesize

      588KB

    • memory/388-100-0x0000000000000000-mapping.dmp
    • memory/388-103-0x0000000000080000-0x00000000000AF000-memory.dmp
      Filesize

      188KB

    • memory/388-102-0x0000000001560000-0x000000000157B000-memory.dmp
      Filesize

      108KB

    • memory/388-104-0x0000000000C70000-0x0000000000F73000-memory.dmp
      Filesize

      3.0MB

    • memory/816-89-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/816-91-0x000000000041F170-mapping.dmp
    • memory/816-97-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/816-95-0x00000000001D0000-0x00000000001E4000-memory.dmp
      Filesize

      80KB

    • memory/816-94-0x0000000000A60000-0x0000000000D63000-memory.dmp
      Filesize

      3.0MB

    • memory/816-90-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/816-88-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/816-98-0x0000000000310000-0x0000000000324000-memory.dmp
      Filesize

      80KB

    • memory/1228-99-0x0000000006470000-0x000000000657B000-memory.dmp
      Filesize

      1.0MB

    • memory/1228-96-0x00000000041A0000-0x00000000042C1000-memory.dmp
      Filesize

      1.1MB

    • memory/1228-106-0x0000000002980000-0x0000000002A4A000-memory.dmp
      Filesize

      808KB

    • memory/1508-68-0x00000000006D0000-0x00000000006D1000-memory.dmp
      Filesize

      4KB

    • memory/1508-66-0x0000000000C60000-0x0000000000C61000-memory.dmp
      Filesize

      4KB

    • memory/1508-70-0x0000000000620000-0x0000000000641000-memory.dmp
      Filesize

      132KB

    • memory/1508-63-0x0000000000000000-mapping.dmp
    • memory/1508-73-0x00000000006D1000-0x00000000006D2000-memory.dmp
      Filesize

      4KB

    • memory/1516-72-0x0000000000000000-mapping.dmp
    • memory/1652-101-0x0000000000000000-mapping.dmp
    • memory/1836-71-0x0000000000000000-mapping.dmp
    • memory/1860-60-0x000007FEFC2E1000-0x000007FEFC2E3000-memory.dmp
      Filesize

      8KB

    • memory/1956-61-0x0000000000000000-mapping.dmp
    • memory/2028-85-0x00000000005A0000-0x00000000005A1000-memory.dmp
      Filesize

      4KB

    • memory/2028-84-0x00000000005D0000-0x00000000005DB000-memory.dmp
      Filesize

      44KB

    • memory/2028-83-0x0000000002451000-0x0000000002452000-memory.dmp
      Filesize

      4KB

    • memory/2028-82-0x0000000002450000-0x0000000002451000-memory.dmp
      Filesize

      4KB

    • memory/2028-79-0x0000000000EA0000-0x0000000000EA1000-memory.dmp
      Filesize

      4KB

    • memory/2028-76-0x0000000000000000-mapping.dmp