Analysis

  • max time kernel
    154s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10-en-20211014
  • submitted
    15-10-2021 19:28

General

  • Target

    invoice Ceylan 49.600€.exe

  • Size

    352KB

  • MD5

    74f87a533471eaa7719df1d9b0593c2a

  • SHA1

    77a20802e1e2db283ddf605a818372a72b0d8e26

  • SHA256

    851b20d33b8210f3d20ab4694011a0858eeb745e248a768c1e4c214efb59464b

  • SHA512

    a65587fa689531ff0d9da0c24ed9fb01adc986353491b6cb65773c66c7d5bf3773f8ae7c87ca4e2485da442c815722cdf5633e425693a8ace5f888744c868438

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

cl8k

C2

http://www.lightiroanwgt76.xyz/cl8k/

Decoy

georgiaprfirm.com

rhinosafeinc.com

gandgpublishing.com

angelyangelarquitectos.com

formation-gallery.com

orangecountyipadrepair.com

aplearn.info

freshlucky.com

wrapfestival.com

zerosarentals.com

ff7a9vlt7.xyz

teachbing.com

mukos.xyz

baojianma.com

dermalaf.com

hannahandpatrick2022.com

yesilnoktam.xyz

theroyalhotels-kw.com

reisebazaar.online

senergypallet.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2920
    • C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe
      "C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\sIYfcmrdwEC" /XML "C:\Users\Admin\AppData\Local\Temp\tmpA573.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:4068
      • C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe
        "C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:648
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\invoice Ceylan 49.600€.exe"
        3⤵
          PID:3652

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Discovery

    System Information Discovery

    2
    T1082

    Query Registry

    1
    T1012

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/648-125-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/648-128-0x0000000001460000-0x0000000001780000-memory.dmp
      Filesize

      3.1MB

    • memory/648-129-0x0000000001410000-0x0000000001424000-memory.dmp
      Filesize

      80KB

    • memory/648-126-0x000000000041F190-mapping.dmp
    • memory/1244-121-0x0000000007CE0000-0x0000000007CE5000-memory.dmp
      Filesize

      20KB

    • memory/1244-122-0x0000000008010000-0x0000000008011000-memory.dmp
      Filesize

      4KB

    • memory/1244-123-0x00000000080B0000-0x0000000008100000-memory.dmp
      Filesize

      320KB

    • memory/1244-120-0x0000000005710000-0x0000000005711000-memory.dmp
      Filesize

      4KB

    • memory/1244-119-0x0000000005730000-0x0000000005C2E000-memory.dmp
      Filesize

      5.0MB

    • memory/1244-118-0x0000000005730000-0x0000000005731000-memory.dmp
      Filesize

      4KB

    • memory/1244-117-0x0000000005C30000-0x0000000005C31000-memory.dmp
      Filesize

      4KB

    • memory/1244-115-0x0000000000D50000-0x0000000000D51000-memory.dmp
      Filesize

      4KB

    • memory/1584-135-0x0000000005000000-0x00000000050AE000-memory.dmp
      Filesize

      696KB

    • memory/1584-136-0x0000000005440000-0x00000000054D3000-memory.dmp
      Filesize

      588KB

    • memory/1584-131-0x0000000000000000-mapping.dmp
    • memory/1584-133-0x0000000004D40000-0x0000000004D6F000-memory.dmp
      Filesize

      188KB

    • memory/1584-132-0x00000000003E0000-0x00000000003EA000-memory.dmp
      Filesize

      40KB

    • memory/2920-130-0x0000000004760000-0x00000000048DD000-memory.dmp
      Filesize

      1.5MB

    • memory/2920-137-0x00000000048E0000-0x0000000004A4F000-memory.dmp
      Filesize

      1.4MB

    • memory/3652-134-0x0000000000000000-mapping.dmp
    • memory/4068-124-0x0000000000000000-mapping.dmp