Analysis

  • max time kernel
    118s
  • max time network
    124s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    16-12-2021 09:35

General

  • Target

    ffd0eebbad68d358abbed65a378e6e9e.exe

  • Size

    423KB

  • MD5

    ffd0eebbad68d358abbed65a378e6e9e

  • SHA1

    769159c6e1a5400304839759257018d373c5c507

  • SHA256

    fedf55446e010cc987ff0313ac685c616e4a01f30a6cc807b3b95fb859714f8b

  • SHA512

    350fbf14b20d21b401f78c3b0c1b9f940a6e5221b59317a7f9f268e96327691891428b78367abd549b64eef027aec181d5aec75c381d9fb383cb3512b186a0e5

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

h4d0

Decoy

onlinefinejewelry.com

samstringermusic.com

beam-lettings.info

optimumcoin.xyz

fasa.xyz

creativedime.com

eihncuz.online

griffin2008.top

europcarlive.com

jxhcar.com

museumsshop.international

bonolaboral-lnterbank.com

kelebandis.xyz

hiddenlakeranch.net

carelessyouth.com

jfkilfoil.store

potok-it-ua.site

magdulemediation.com

shakadal.xyz

coastconstructionfl.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ffd0eebbad68d358abbed65a378e6e9e.exe
    "C:\Users\Admin\AppData\Local\Temp\ffd0eebbad68d358abbed65a378e6e9e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\ffd0eebbad68d358abbed65a378e6e9e.exe
      "C:\Users\Admin\AppData\Local\Temp\ffd0eebbad68d358abbed65a378e6e9e.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:3664

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\nsbF956.tmp\yhdzjlqcadc.dll
    MD5

    f21d6dcfc975106c12aa9dc1ec3b6c72

    SHA1

    3f3d0a17de921f804bb8206d6d56b95afb2d4e00

    SHA256

    56afede8c297ddf311728ff6717e45c93ca5cf3af3d0295ea57fc83e3ec80512

    SHA512

    34b369eddd14ad8627b15aebf5accdd32dede7241b453b0aa4b28f22a11991c9eb3a1fef47924cf1414864c5f0a3553ad3e3878eea376a9fbbd64d14f7e6cb7e

  • memory/3664-116-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/3664-117-0x000000000041F130-mapping.dmp
  • memory/3664-118-0x0000000000A40000-0x0000000000D60000-memory.dmp
    Filesize

    3.1MB