Analysis

  • max time kernel
    146s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-en-20211208
  • submitted
    29-01-2022 09:58

General

  • Target

    NEW ORDER.scr

  • Size

    818KB

  • MD5

    7735f514bfc4111a49a0ed6078206788

  • SHA1

    766933ccc287d5734ae351ca42fcb5ee6c1bd56f

  • SHA256

    f2d58fc68302fb9cfc6ba93ca4f01f17c8baf7fef4cdfef59638e61fa4f54ad4

  • SHA512

    a566f4372171517129aed5370937dfe6abb23aec230bb4ecefb63ec62c0df414d9708e7e8f97ece1c3ab6de5c64c9d6d7460d34b18e9199370e253e06cf18bae

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

s16r

Decoy

kellieroysellsnc.com

valleylowvoltage.com

mltuo900.xyz

visitingpuntacana.com

weiwushi.com

austintechjob.com

rxstarcbd.com

shopstudioesi.com

filetto-server.xyz

relianceltdbnk.com

unethical.world

yedd.store

esthershhs.com

magaddis.com

scenicdrivetours.com

123gest.com

2020mortagelifeinsurance.com

faceinle.com

integritymarking.com

alfatoto.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\NEW ORDER.scr
      "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.scr" /S
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1508
      • C:\Users\Admin\AppData\Local\Temp\NEW ORDER.scr
        "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.scr"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1132
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:616
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\NEW ORDER.scr"
        3⤵
        • Deletes itself
        PID:1896

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/616-66-0x0000000000120000-0x000000000013C000-memory.dmp
    Filesize

    112KB

  • memory/616-69-0x0000000001D80000-0x0000000001E13000-memory.dmp
    Filesize

    588KB

  • memory/616-68-0x0000000001E90000-0x0000000002193000-memory.dmp
    Filesize

    3.0MB

  • memory/616-67-0x0000000000080000-0x00000000000AF000-memory.dmp
    Filesize

    188KB

  • memory/1132-62-0x0000000000890000-0x0000000000B93000-memory.dmp
    Filesize

    3.0MB

  • memory/1132-58-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1132-59-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1132-60-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1132-63-0x0000000000320000-0x0000000000334000-memory.dmp
    Filesize

    80KB

  • memory/1316-64-0x0000000005F10000-0x000000000601B000-memory.dmp
    Filesize

    1.0MB

  • memory/1316-70-0x0000000006810000-0x0000000006945000-memory.dmp
    Filesize

    1.2MB

  • memory/1508-53-0x0000000001070000-0x0000000001142000-memory.dmp
    Filesize

    840KB

  • memory/1508-57-0x00000000055F0000-0x0000000005656000-memory.dmp
    Filesize

    408KB

  • memory/1508-56-0x0000000000630000-0x000000000063C000-memory.dmp
    Filesize

    48KB

  • memory/1508-55-0x00000000003D0000-0x00000000003D1000-memory.dmp
    Filesize

    4KB

  • memory/1508-54-0x0000000076911000-0x0000000076913000-memory.dmp
    Filesize

    8KB