Analysis

  • max time kernel
    145s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    05-05-2022 06:23

General

  • Target

    BG032442552676.exe

  • Size

    1.1MB

  • MD5

    69d7fd7b1cc3a2517941731fb9c3aa2c

  • SHA1

    70e96be6d19db9218684b29882e424e877071db4

  • SHA256

    b8866409889805cd3132c7f3db0d02294eb25e747e0e095e913e2d75d437df59

  • SHA512

    72ec387553a61718d8105b7ea9141c38edca49364616c9d0ce86b366c19ef75a4112be7d292dc7193077432cc353612a0539fcc349164efeec423d2e4c4a1d19

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

videohm.com

panache-rose.com

alnooncars-kw.com

trueblue2u.com

brussels-cafe.com

ip2c.net

influenzerr.com

rbcoq.com

zzful.com

drainthe.com

sumaholesson.com

cursosaprovados.com

genotecinc.com

dbrulhart.com

theapiarystudios.com

kensyu-kan.com

dkku88.com

tikhyper.com

aztecnort.com

homebrim.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • ModiLoader Second Stage 38 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1256
      • C:\Users\Admin\AppData\Local\Temp\BG032442552676.exe
        "C:\Users\Admin\AppData\Local\Temp\BG032442552676.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1788
        • C:\Windows\SysWOW64\DpiScaling.exe
          C:\Windows\System32\DpiScaling.exe
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:568
          • C:\Windows\SysWOW64\netsh.exe
            "C:\Windows\SysWOW64\netsh.exe"
            4⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:680
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\SysWOW64\DpiScaling.exe"
              5⤵
                PID:1752

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/568-93-0x0000000010410000-0x000000001043E000-memory.dmp
        Filesize

        184KB

      • memory/568-95-0x0000000000000000-mapping.dmp
      • memory/568-103-0x0000000002180000-0x0000000002483000-memory.dmp
        Filesize

        3.0MB

      • memory/568-105-0x00000000001E0000-0x00000000001F4000-memory.dmp
        Filesize

        80KB

      • memory/568-120-0x0000000010410000-0x000000001043E000-memory.dmp
        Filesize

        184KB

      • memory/568-121-0x0000000000290000-0x00000000002A4000-memory.dmp
        Filesize

        80KB

      • memory/680-128-0x0000000000A80000-0x0000000000B13000-memory.dmp
        Filesize

        588KB

      • memory/680-126-0x0000000000080000-0x00000000000AE000-memory.dmp
        Filesize

        184KB

      • memory/680-127-0x0000000000C10000-0x0000000000F13000-memory.dmp
        Filesize

        3.0MB

      • memory/680-125-0x0000000001740000-0x000000000175B000-memory.dmp
        Filesize

        108KB

      • memory/680-123-0x0000000000000000-mapping.dmp
      • memory/1256-122-0x0000000004E00000-0x0000000004EEB000-memory.dmp
        Filesize

        940KB

      • memory/1256-129-0x0000000004F30000-0x000000000503B000-memory.dmp
        Filesize

        1.0MB

      • memory/1256-119-0x0000000004D10000-0x0000000004DF1000-memory.dmp
        Filesize

        900KB

      • memory/1752-124-0x0000000000000000-mapping.dmp
      • memory/1788-87-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-98-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-73-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-80-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-81-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-79-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-78-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-77-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-84-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-83-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-82-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-75-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-86-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-85-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-90-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-89-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-88-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-92-0x0000000010410000-0x000000001043E000-memory.dmp
        Filesize

        184KB

      • memory/1788-96-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-74-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-99-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-100-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-102-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-112-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-111-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-113-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-115-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-116-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-117-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-76-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-69-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-70-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-72-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-71-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-67-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-68-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-66-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-65-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB

      • memory/1788-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
        Filesize

        8KB

      • memory/1788-118-0x0000000004A80000-0x0000000004ADA000-memory.dmp
        Filesize

        360KB