Analysis

  • max time kernel
    150s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-en-20211014
  • submitted
    24-11-2021 12:33

General

  • Target

    indexxx.exe

  • Size

    296KB

  • MD5

    0e8ecafcc4dac9129241e73027dc38d6

  • SHA1

    f18003b9ab2278a390f5728a2c83e7047737aa25

  • SHA256

    9df726f24b0a1282ca604a08a4648f527dae3e61712ea3954305362dc3ef4e10

  • SHA512

    075919fdd5f3fb21bd09d8dd41851584905e214580726b5c180eb87830109ae7435465f37c9d865c966c4240cb6ffd1f4af661a935bf49c99e4b35d5a14e5048

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

jy0b

C2

http://www.filecrev.com/jy0b/

Decoy

lamejorimagen.com

mykabukibrush.com

modgon.com

barefoottherapeutics.com

shimpeg.net

trade-sniper.com

chiangkhancityhotel.com

joblessmoni.club

stespritsubways.com

chico-group.com

nni8.xyz

searchtypically.online

jobsyork.com

bestsales-crypto.com

iqmarketing.info

bullcityphotobooths.com

fwssc.icu

1oc87s.icu

usdiesel.xyz

secrets2optimumnutrition.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\indexxx.exe
      "C:\Users\Admin\AppData\Local\Temp\indexxx.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1364
      • C:\Users\Admin\AppData\Local\Temp\indexxx.exe
        "C:\Users\Admin\AppData\Local\Temp\indexxx.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1020
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:1128
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\SysWOW64\netsh.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1732
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\indexxx.exe"
          3⤵
          • Deletes itself
          PID:1432

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\nsnDEAC.tmp\vxlhto.dll
      MD5

      1cbb2db0be5023d1ab7f39a66f47c439

      SHA1

      cd0588d1b0f597a7541b36db3480d3380131f50e

      SHA256

      4e58bbb18e10dcdce812bae5ae8f9b927867a3af44c3829f6d3bd234dbdb2c33

      SHA512

      d275a0ed6066abc695ce1d5ad750979aaee9d146e2fd4fa8f70de80e1a5bb9873cb27492efa6c54e6e0567cf0c1bea5d010f4037951f88ef584b0ef645e371da

    • memory/1020-60-0x0000000000840000-0x0000000000B43000-memory.dmp
      Filesize

      3.0MB

    • memory/1020-57-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1020-58-0x000000000041F150-mapping.dmp
    • memory/1020-61-0x00000000002C0000-0x00000000002D4000-memory.dmp
      Filesize

      80KB

    • memory/1284-62-0x0000000006AE0000-0x0000000006BEB000-memory.dmp
      Filesize

      1.0MB

    • memory/1284-69-0x0000000007AF0000-0x0000000007C67000-memory.dmp
      Filesize

      1.5MB

    • memory/1364-55-0x0000000076231000-0x0000000076233000-memory.dmp
      Filesize

      8KB

    • memory/1432-64-0x0000000000000000-mapping.dmp
    • memory/1732-63-0x0000000000000000-mapping.dmp
    • memory/1732-65-0x00000000011C0000-0x00000000011DB000-memory.dmp
      Filesize

      108KB

    • memory/1732-66-0x0000000000080000-0x00000000000AF000-memory.dmp
      Filesize

      188KB

    • memory/1732-67-0x0000000000BF0000-0x0000000000EF3000-memory.dmp
      Filesize

      3.0MB

    • memory/1732-68-0x0000000000920000-0x00000000009B3000-memory.dmp
      Filesize

      588KB