Analysis

  • max time kernel
    147s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220331-en
  • submitted
    14-04-2022 12:40

General

  • Target

    e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe

  • Size

    747KB

  • MD5

    86882908b1bf788112a2da6bfde08a7c

  • SHA1

    995c4ab5a4bab535066635f287f87799691f4ff8

  • SHA256

    e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96

  • SHA512

    88af00ef5a33ef12208ea42e51b1892f127bb755b3032beef8bc3d281685d9fb82721cc85bce672740773dca38c2f55a816175effa45a86bec69e20b48783321

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fs8

Decoy

deanpalm.net

dinu-living.com

setsomegoals.com

craftyfresh.email

cleantons.com

szysjfjx.com

shestakova.info

70skinstore.com

ampletrade.ltd

cmmcwomen.group

michinoeki-taka.com

auntoni.com

huochegw.com

abovekulture.com

gzjige.com

americastandproudagain.com

hobbyhousekennels.com

1020waterviewdrive.com

5927399.com

gabipareras.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Meta Stealer Stealer

    Meta Stealer steals passwords stored in browsers, written in C++.

  • Formbook Payload 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 12 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:764
    • C:\Users\Admin\AppData\Local\Temp\e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe
      "C:\Users\Admin\AppData\Local\Temp\e2328874b4deb0accd85b76ba1a5f7734dc7e70ff17f4722bf9158d54a0aab96.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4752
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\atPWLmI" /XML "C:\Users\Admin\AppData\Local\Temp\tmp28E5.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:824
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        3⤵
          PID:2940
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "{path}"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4068
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\SysWOW64\explorer.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1664
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:4116

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\tmp28E5.tmp

        Filesize

        1KB

        MD5

        e85de933c16e13b66a1c5e6630b9511d

        SHA1

        f94a4a60a461429e8441941d6b01576e82dbfbb3

        SHA256

        823cc84ebeb177ec7149ed9f2a22b8e2048d61a279b7724e503281fd7feb639b

        SHA512

        b464d79d84a866001330c611b2a1c131ed7fa22510e537267f33540b7af6954ad4f34af1c32e49bfb6b4a14c8318aa3459a0b0ace56dfc5952c430ff1faac193

      • memory/764-138-0x0000000003200000-0x00000000032CD000-memory.dmp

        Filesize

        820KB

      • memory/764-145-0x00000000087A0000-0x0000000008839000-memory.dmp

        Filesize

        612KB

      • memory/1664-144-0x00000000028A0000-0x0000000002933000-memory.dmp

        Filesize

        588KB

      • memory/1664-142-0x0000000002A60000-0x0000000002DAA000-memory.dmp

        Filesize

        3.3MB

      • memory/1664-141-0x0000000000A60000-0x0000000000A8E000-memory.dmp

        Filesize

        184KB

      • memory/1664-140-0x0000000000280000-0x00000000006B3000-memory.dmp

        Filesize

        4.2MB

      • memory/4068-134-0x0000000000400000-0x000000000042E000-memory.dmp

        Filesize

        184KB

      • memory/4068-135-0x0000000001000000-0x000000000134A000-memory.dmp

        Filesize

        3.3MB

      • memory/4068-137-0x0000000000B80000-0x0000000000B94000-memory.dmp

        Filesize

        80KB

      • memory/4752-124-0x0000000000B40000-0x0000000000C02000-memory.dmp

        Filesize

        776KB

      • memory/4752-129-0x0000000008D90000-0x0000000008E2C000-memory.dmp

        Filesize

        624KB

      • memory/4752-128-0x0000000008FE0000-0x000000000950C000-memory.dmp

        Filesize

        5.2MB

      • memory/4752-127-0x00000000055E0000-0x00000000055EA000-memory.dmp

        Filesize

        40KB

      • memory/4752-126-0x00000000057D0000-0x0000000005862000-memory.dmp

        Filesize

        584KB

      • memory/4752-125-0x000000000A060000-0x000000000A604000-memory.dmp

        Filesize

        5.6MB