Analysis

  • max time kernel
    148s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    04-05-2022 06:30

General

  • Target

    DHL_AWB_NO#907853880911.exe

  • Size

    214KB

  • MD5

    cb6473d9957727bbd81427834f50a805

  • SHA1

    f1013f971cf73b3f31cc3e9b26c985101f48a524

  • SHA256

    9ff4f71e3878c4aae12440d4f8e6a8fa2af51c60c5375b49f4e0a8d8ffc8c2b2

  • SHA512

    b6bfd7b90bb9ba1e4e36fedfa95502202e68378a3257de5ee56593a08bd40abfe0e68ec5433d140adec77bc6e1586fc04f78df23e830b0d52fd617dee08c27a5

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fw02

Decoy

payer-breakers.com

thesiscoper.com

rental-villa.com

scovikinnovations.com

hydh33.com

allmyshit.rest

lovejaclyn.com

vanessaruizwriting.com

dufonddelaclasse.com

kiddee168.com

monumentalmarketsllc.com

musclegainfatloss.com

avida.info

cosmo-wellness.net

dandelionfusedigital.com

oversizeloadbanners.com

konstelle.store

sdjnsbd.com

czoqg.xyz

5p6xljjse1lq.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\DHL_AWB_NO#907853880911.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL_AWB_NO#907853880911.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1864
      • C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe
        C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe C:\Users\Admin\AppData\Local\Temp\qwmuparjjb
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1792
        • C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe
          C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe C:\Users\Admin\AppData\Local\Temp\qwmuparjjb
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1112
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe"
        3⤵
          PID:1484

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Command-Line Interface

    1
    T1059

    Discovery

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\jv6sl5sq4bnx22fi5ox
      Filesize

      184KB

      MD5

      9b1336dabaae1f804ddf1808f1567091

      SHA1

      9f7786bcf569eefc8010af02180fb0a56252f4b0

      SHA256

      8c47843c011156564f51b8cb5ad85d511f7e4f8a7d603c49bda0a6bb9f8e698d

      SHA512

      29d9b78662152b19a62aaaca5f10bdea2e71d4ec46e4ba890bd6c8dbb7e4b88e6dc25cc3c44a2d80fb53192858367a11c19e1fb8e44d9bec378b57e32c223c05

    • C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe
      Filesize

      3KB

      MD5

      4d5096cfc008db421ac8bc0ea97475ba

      SHA1

      177487b2d7f073749c0f8e19014523689fe04fc1

      SHA256

      b7d02490ef2d490de1982ca29c2d9f8737dc5203c60eabf20273d57dd7c6fb84

      SHA512

      ebc9b08510b2a1910ee49d3204dd38e71b54072e67bc2dd7c163647d545280867e6e1de45ea87bd021f283e2198ac652d1718f2af2c19d5a1408f26e4a1bfafd

    • C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe
      Filesize

      3KB

      MD5

      4d5096cfc008db421ac8bc0ea97475ba

      SHA1

      177487b2d7f073749c0f8e19014523689fe04fc1

      SHA256

      b7d02490ef2d490de1982ca29c2d9f8737dc5203c60eabf20273d57dd7c6fb84

      SHA512

      ebc9b08510b2a1910ee49d3204dd38e71b54072e67bc2dd7c163647d545280867e6e1de45ea87bd021f283e2198ac652d1718f2af2c19d5a1408f26e4a1bfafd

    • C:\Users\Admin\AppData\Local\Temp\niqxldqr.exe
      Filesize

      3KB

      MD5

      4d5096cfc008db421ac8bc0ea97475ba

      SHA1

      177487b2d7f073749c0f8e19014523689fe04fc1

      SHA256

      b7d02490ef2d490de1982ca29c2d9f8737dc5203c60eabf20273d57dd7c6fb84

      SHA512

      ebc9b08510b2a1910ee49d3204dd38e71b54072e67bc2dd7c163647d545280867e6e1de45ea87bd021f283e2198ac652d1718f2af2c19d5a1408f26e4a1bfafd

    • C:\Users\Admin\AppData\Local\Temp\qwmuparjjb
      Filesize

      4KB

      MD5

      0026cbf7d2d6b1347887dc373dfa9d68

      SHA1

      fcffc36133a96798ede914bdca44105302592001

      SHA256

      f5a1620e896bf161a8e83461276ac252619ce8f775815cafd88555a728eae9d2

      SHA512

      d825335c7e5d76938d36516c4f4e0f42c4c4bfd98225a508ecd6fafaaed41fda16ca8a7da67b8d2411d2a57c25fef8ca24c1298ae98243598ed8be7e89ab6b3a

    • \Users\Admin\AppData\Local\Temp\niqxldqr.exe
      Filesize

      3KB

      MD5

      4d5096cfc008db421ac8bc0ea97475ba

      SHA1

      177487b2d7f073749c0f8e19014523689fe04fc1

      SHA256

      b7d02490ef2d490de1982ca29c2d9f8737dc5203c60eabf20273d57dd7c6fb84

      SHA512

      ebc9b08510b2a1910ee49d3204dd38e71b54072e67bc2dd7c163647d545280867e6e1de45ea87bd021f283e2198ac652d1718f2af2c19d5a1408f26e4a1bfafd

    • \Users\Admin\AppData\Local\Temp\niqxldqr.exe
      Filesize

      3KB

      MD5

      4d5096cfc008db421ac8bc0ea97475ba

      SHA1

      177487b2d7f073749c0f8e19014523689fe04fc1

      SHA256

      b7d02490ef2d490de1982ca29c2d9f8737dc5203c60eabf20273d57dd7c6fb84

      SHA512

      ebc9b08510b2a1910ee49d3204dd38e71b54072e67bc2dd7c163647d545280867e6e1de45ea87bd021f283e2198ac652d1718f2af2c19d5a1408f26e4a1bfafd

    • memory/1112-68-0x0000000000800000-0x0000000000B03000-memory.dmp
      Filesize

      3.0MB

    • memory/1112-69-0x00000000002C0000-0x00000000002D4000-memory.dmp
      Filesize

      80KB

    • memory/1112-64-0x000000000041F150-mapping.dmp
    • memory/1112-63-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1112-67-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1256-70-0x0000000004C30000-0x0000000004CF1000-memory.dmp
      Filesize

      772KB

    • memory/1256-77-0x0000000004D00000-0x0000000004E0F000-memory.dmp
      Filesize

      1.1MB

    • memory/1484-72-0x0000000000000000-mapping.dmp
    • memory/1564-71-0x0000000000000000-mapping.dmp
    • memory/1564-73-0x0000000000030000-0x0000000000039000-memory.dmp
      Filesize

      36KB

    • memory/1564-74-0x0000000000090000-0x00000000000BF000-memory.dmp
      Filesize

      188KB

    • memory/1564-75-0x00000000020B0000-0x00000000023B3000-memory.dmp
      Filesize

      3.0MB

    • memory/1564-76-0x0000000001DA0000-0x0000000001E33000-memory.dmp
      Filesize

      588KB

    • memory/1792-56-0x0000000000000000-mapping.dmp
    • memory/1864-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
      Filesize

      8KB