Analysis

  • max time kernel
    156s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    15-10-2021 19:28

General

  • Target

    invoice Ceylan 49.600€.exe

  • Size

    352KB

  • MD5

    74f87a533471eaa7719df1d9b0593c2a

  • SHA1

    77a20802e1e2db283ddf605a818372a72b0d8e26

  • SHA256

    851b20d33b8210f3d20ab4694011a0858eeb745e248a768c1e4c214efb59464b

  • SHA512

    a65587fa689531ff0d9da0c24ed9fb01adc986353491b6cb65773c66c7d5bf3773f8ae7c87ca4e2485da442c815722cdf5633e425693a8ace5f888744c868438

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cl8k

C2

http://www.lightiroanwgt76.xyz/cl8k/

Decoy

georgiaprfirm.com

rhinosafeinc.com

gandgpublishing.com

angelyangelarquitectos.com

formation-gallery.com

orangecountyipadrepair.com

aplearn.info

freshlucky.com

wrapfestival.com

zerosarentals.com

ff7a9vlt7.xyz

teachbing.com

mukos.xyz

baojianma.com

dermalaf.com

hannahandpatrick2022.com

yesilnoktam.xyz

theroyalhotels-kw.com

reisebazaar.online

senergypallet.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe
      "C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sIYfcmrdwEC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD671.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:692
      • C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe
        "C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1084
    • C:\Windows\SysWOW64\NAPSTAT.EXE
      "C:\Windows\SysWOW64\NAPSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1640
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe"
        3⤵
        • Deletes itself
        PID:1548

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/692-61-0x0000000000000000-mapping.dmp
  • memory/1084-67-0x0000000000840000-0x0000000000B43000-memory.dmp
    Filesize

    3.0MB

  • memory/1084-63-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1084-65-0x000000000041F190-mapping.dmp
  • memory/1084-68-0x00000000002B0000-0x00000000002C4000-memory.dmp
    Filesize

    80KB

  • memory/1084-64-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1084-62-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1396-76-0x0000000007E20000-0x0000000007F9B000-memory.dmp
    Filesize

    1.5MB

  • memory/1396-69-0x0000000006AF0000-0x0000000006C6F000-memory.dmp
    Filesize

    1.5MB

  • memory/1548-71-0x0000000000000000-mapping.dmp
  • memory/1572-57-0x0000000074A31000-0x0000000074A33000-memory.dmp
    Filesize

    8KB

  • memory/1572-59-0x0000000000550000-0x0000000000555000-memory.dmp
    Filesize

    20KB

  • memory/1572-58-0x0000000004E50000-0x0000000004E51000-memory.dmp
    Filesize

    4KB

  • memory/1572-60-0x0000000004790000-0x00000000047E0000-memory.dmp
    Filesize

    320KB

  • memory/1572-55-0x0000000000EB0000-0x0000000000EB1000-memory.dmp
    Filesize

    4KB

  • memory/1640-70-0x0000000000000000-mapping.dmp
  • memory/1640-72-0x00000000001A0000-0x00000000001E6000-memory.dmp
    Filesize

    280KB

  • memory/1640-73-0x00000000000C0000-0x00000000000EF000-memory.dmp
    Filesize

    188KB

  • memory/1640-74-0x0000000001E50000-0x0000000002153000-memory.dmp
    Filesize

    3.0MB

  • memory/1640-75-0x0000000001D70000-0x0000000001E03000-memory.dmp
    Filesize

    588KB