Analysis

  • max time kernel
    151s
  • max time network
    143s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    14-10-2021 13:09

General

  • Target

    010013.exe

  • Size

    587KB

  • MD5

    b670879d45e75eb7f88fe047f9e88e5f

  • SHA1

    7497d669a327aebf33ec9dd1c554444d4ee826cf

  • SHA256

    ec427d5a521cdc4f2690ac7ffa883c982c4e3008991127998b0cfdf32f240f30

  • SHA512

    b3f60dc3e35babbce28cbbdb21e067dbdfa41b05ccfb35693bc4c84db90fe32551701924ede85517cd5676cca999a16d3bffc71175a97b1ea74ad41cfcc45839

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

o4ms

C2

http://www.nocodehost.com/o4ms/

Decoy

fishingboatpub.com

trebor72.com

qualitycleanaustralia.com

amphilykenyx.com

jayte90.net

alveegrace.com

le-fleursoleil.com

volumoffer.com

businessbookwriters.com

alpin-art.com

firsttastetogo.com

catofc.com

ref-290.com

sbo2008.com

fortlauderdaleelevators.com

shanghaiyalian.com

majestybags.com

afcerd.com

myceliated.com

ls0a.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\010013.exe
      "C:\Users\Admin\AppData\Local\Temp\010013.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1684
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ELqDlkdxF" /XML "C:\Users\Admin\AppData\Local\Temp\tmp3BBD.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:1380
      • C:\Users\Admin\AppData\Local\Temp\010013.exe
        "C:\Users\Admin\AppData\Local\Temp\010013.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2852
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\010013.exe"
        3⤵
          PID:1196

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/616-136-0x00000000041A0000-0x0000000004233000-memory.dmp
      Filesize

      588KB

    • memory/616-133-0x0000000000BB0000-0x0000000000BCF000-memory.dmp
      Filesize

      124KB

    • memory/616-135-0x0000000004310000-0x0000000004630000-memory.dmp
      Filesize

      3.1MB

    • memory/616-134-0x00000000005B0000-0x00000000005DE000-memory.dmp
      Filesize

      184KB

    • memory/616-131-0x0000000000000000-mapping.dmp
    • memory/1196-132-0x0000000000000000-mapping.dmp
    • memory/1380-124-0x0000000000000000-mapping.dmp
    • memory/1684-121-0x00000000054E0000-0x00000000054E5000-memory.dmp
      Filesize

      20KB

    • memory/1684-119-0x00000000051B0000-0x00000000056AE000-memory.dmp
      Filesize

      5.0MB

    • memory/1684-117-0x00000000056B0000-0x00000000056B1000-memory.dmp
      Filesize

      4KB

    • memory/1684-118-0x0000000005250000-0x0000000005251000-memory.dmp
      Filesize

      4KB

    • memory/1684-123-0x0000000007B10000-0x0000000007B82000-memory.dmp
      Filesize

      456KB

    • memory/1684-120-0x00000000051D0000-0x00000000051D1000-memory.dmp
      Filesize

      4KB

    • memory/1684-115-0x0000000000900000-0x0000000000901000-memory.dmp
      Filesize

      4KB

    • memory/1684-122-0x0000000007970000-0x0000000007971000-memory.dmp
      Filesize

      4KB

    • memory/2852-128-0x00000000012F0000-0x0000000001610000-memory.dmp
      Filesize

      3.1MB

    • memory/2852-129-0x0000000001010000-0x0000000001024000-memory.dmp
      Filesize

      80KB

    • memory/2852-126-0x000000000041EAB0-mapping.dmp
    • memory/2852-125-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3028-130-0x0000000001050000-0x0000000001113000-memory.dmp
      Filesize

      780KB

    • memory/3028-137-0x0000000002F70000-0x000000000304B000-memory.dmp
      Filesize

      876KB