Analysis

  • max time kernel
    149s
  • max time network
    158s
  • platform
    windows10_x64
  • resource
    win10-en-20210920
  • submitted
    29-10-2021 18:24

General

  • Target

    order draft.com.exe

  • Size

    471KB

  • MD5

    f010aecf40c6d5a592dc55c4f95d15aa

  • SHA1

    4e202b8ccf0841562a9aa9fa5bef3333f25ba57f

  • SHA256

    79b16be36de1dfa5a48d965e4a4c19c7c481b6972392e6d0e6edd00447297b96

  • SHA512

    e10b463221730ee2362ded75711d3eb636c13f087fea2e01761706bc6382fe2fb51f34f7c5fae1b7250ed0de11ea8e1753b6807ec8ec5e25d2429d731e1e4367

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dn7r

C2

http://www.yourherogarden.net/dn7r/

Decoy

eventphotographerdfw.com

thehalalcoinstaking.com

philipfaziofineart.com

intercoh.com

gaiaseyephotography.com

chatbotforrealestate.com

lovelancemg.com

marlieskasberger.com

elcongoenespanol.info

lepirecredit.com

distribution-concept.com

e99game.com

exit11festival.com

twodollartoothbrushclub.com

cocktailsandlawn.com

performimprove.network

24horas-telefono-11840.com

cosmossify.com

kellenleote.com

perovskite.energy

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3028
    • C:\Users\Admin\AppData\Local\Temp\order draft.com.exe
      "C:\Users\Admin\AppData\Local\Temp\order draft.com.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3560
      • C:\Users\Admin\AppData\Local\Temp\order draft.com.exe
        "C:\Users\Admin\AppData\Local\Temp\order draft.com.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3016
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4188
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\order draft.com.exe"
        3⤵
          PID:4364

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsqDFB3.tmp\ywnsrue.dll
      MD5

      e6d448f7689e4145e5ef68292eb7145a

      SHA1

      18d8cfa86b7d5463e888d48194a42584fc297959

      SHA256

      1c432a5e6d687dc495ccab5e2b532730219eb95bace8ab65ba50e26405b6b212

      SHA512

      b88698eebbd292f4cd1c6be0b707d1a14a797cf679bd719036b2b6b0448cd757156d8a77e0c23d09907efc4366fad5abcc1669bac1ba9e5a25a89ca92a2eabb7

    • memory/3016-123-0x0000000000A40000-0x0000000000A55000-memory.dmp
      Filesize

      84KB

    • memory/3016-116-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/3016-117-0x000000000041F200-mapping.dmp
    • memory/3016-119-0x0000000000AC0000-0x0000000000DE0000-memory.dmp
      Filesize

      3.1MB

    • memory/3016-121-0x00000000009E0000-0x00000000009F5000-memory.dmp
      Filesize

      84KB

    • memory/3016-122-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/3028-124-0x0000000004FA0000-0x0000000005109000-memory.dmp
      Filesize

      1.4MB

    • memory/3028-120-0x0000000004E10000-0x0000000004F97000-memory.dmp
      Filesize

      1.5MB

    • memory/3028-133-0x00000000026B0000-0x0000000002774000-memory.dmp
      Filesize

      784KB

    • memory/4188-125-0x0000000000000000-mapping.dmp
    • memory/4188-126-0x0000000000B40000-0x0000000000B41000-memory.dmp
      Filesize

      4KB

    • memory/4188-127-0x0000000000B40000-0x0000000000B41000-memory.dmp
      Filesize

      4KB

    • memory/4188-130-0x0000000002E50000-0x0000000002E7F000-memory.dmp
      Filesize

      188KB

    • memory/4188-129-0x0000000000B50000-0x0000000000B62000-memory.dmp
      Filesize

      72KB

    • memory/4188-131-0x0000000004CA0000-0x0000000004FC0000-memory.dmp
      Filesize

      3.1MB

    • memory/4188-132-0x0000000004B00000-0x0000000004B94000-memory.dmp
      Filesize

      592KB

    • memory/4364-128-0x0000000000000000-mapping.dmp