Analysis

  • max time kernel
    146s
  • max time network
    159s
  • platform
    windows7_x64
  • resource
    win7-en-20210920
  • submitted
    28-10-2021 18:06

General

  • Target

    N001028.exe

  • Size

    282KB

  • MD5

    61e09b1e377cbf8017861bfd9dedfb55

  • SHA1

    2ce56c49d71b9771a837f00b9e9ec58cfe53afad

  • SHA256

    61caa9b68c303d1fb37e196154c0bf9a460441673084a307028a88002e10fd94

  • SHA512

    e4ed7e7b827cf2298cd8b643a6feef07657f0c654b6a22b00d68dd251580214db6546ef79ef4c8575bc16e7e8f51f765f7980152801f82b812b65ad9e4fe5a70

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

mg0t

C2

http://www.q0yczwyc.asia/mg0t/

Decoy

3949842.com

webxdigital.net

dirums.online

metawiser.com

takefreepass.com

colphata.com

searchwebsafety.online

unrule.net

merch.ventures

tooreake.xyz

leonelaperu.com

qiangcai.xyz

cocco24.com

lovinganime.com

mbfad.com

historytodaygameshow.com

gadgetwellprotected.com

nutritoken-diet.com

liberty-lilies.com

singleofficial.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1364
    • C:\Users\Admin\AppData\Local\Temp\N001028.exe
      "C:\Users\Admin\AppData\Local\Temp\N001028.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1936
      • C:\Users\Admin\AppData\Local\Temp\N001028.exe
        "C:\Users\Admin\AppData\Local\Temp\N001028.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1456
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1404
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\N001028.exe"
        3⤵
        • Deletes itself
        PID:1460

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsd2A4C.tmp\zohf.dll
    MD5

    f57352202d8f3d69a44189ef03225b61

    SHA1

    b86a800234755031db7bce7aee2edf8109aa3e20

    SHA256

    308cdec30a859b7b4fc204cbd47e0896017ce4bcba3736e99c04d1c157c6211f

    SHA512

    f3ac2c1b554f9c11f59ca64757df60aa1f29c691d30f0d1c70a18a0bda2b2cfafd456f3e7fb4955167e54918a4cdf94fb114f99acf43ea5f8fb977da48dbb3a2

  • memory/1364-61-0x0000000006440000-0x0000000006589000-memory.dmp
    Filesize

    1.3MB

  • memory/1364-68-0x0000000006990000-0x0000000006A4E000-memory.dmp
    Filesize

    760KB

  • memory/1404-64-0x0000000001250000-0x000000000126B000-memory.dmp
    Filesize

    108KB

  • memory/1404-62-0x0000000000000000-mapping.dmp
  • memory/1404-65-0x0000000000080000-0x00000000000AF000-memory.dmp
    Filesize

    188KB

  • memory/1404-66-0x0000000000CC0000-0x0000000000FC3000-memory.dmp
    Filesize

    3.0MB

  • memory/1404-67-0x0000000000450000-0x00000000004E3000-memory.dmp
    Filesize

    588KB

  • memory/1456-59-0x00000000008D0000-0x0000000000BD3000-memory.dmp
    Filesize

    3.0MB

  • memory/1456-60-0x0000000000350000-0x0000000000364000-memory.dmp
    Filesize

    80KB

  • memory/1456-57-0x000000000041F0D0-mapping.dmp
  • memory/1456-56-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1460-63-0x0000000000000000-mapping.dmp
  • memory/1936-54-0x0000000076B61000-0x0000000076B63000-memory.dmp
    Filesize

    8KB