Analysis

  • max time kernel
    140s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    12-05-2022 18:19

General

  • Target

    DHL_AWB_NO#907853880911.exe

  • Size

    267KB

  • MD5

    9d5bfa23857f350ce14dd21f0a42bd29

  • SHA1

    bbf0a34b5e758b99c49f3b7e14cfe9a50c436400

  • SHA256

    f0c572c44f221308ba93f1301f995c5e8056be18e5a06c0470f383f1362aa692

  • SHA512

    d6396c093d64b6648d125e8c7fdd6b4e08d5b2a6bb47d088bb32157b1d27b0883c0f732a350dfe7e49e006eb15ebe68b30610c66e3776cfe1b8452026b4753f3

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fw02

Decoy

payer-breakers.com

thesiscoper.com

rental-villa.com

scovikinnovations.com

hydh33.com

allmyshit.rest

lovejaclyn.com

vanessaruizwriting.com

dufonddelaclasse.com

kiddee168.com

monumentalmarketsllc.com

musclegainfatloss.com

avida.info

cosmo-wellness.net

dandelionfusedigital.com

oversizeloadbanners.com

konstelle.store

sdjnsbd.com

czoqg.xyz

5p6xljjse1lq.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\DHL_AWB_NO#907853880911.exe
    "C:\Users\Admin\AppData\Local\Temp\DHL_AWB_NO#907853880911.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Users\Admin\AppData\Local\Temp\woydiaq.exe
      C:\Users\Admin\AppData\Local\Temp\woydiaq.exe C:\Users\Admin\AppData\Local\Temp\spztad
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2044
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:1204
  • C:\Users\Admin\AppData\Local\Temp\woydiaq.exe
    C:\Users\Admin\AppData\Local\Temp\woydiaq.exe C:\Users\Admin\AppData\Local\Temp\spztad
    1⤵
    • Executes dropped EXE
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    PID:1720

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\spztad
    Filesize

    5KB

    MD5

    0aedeefbab464a4415407c295d16e4df

    SHA1

    1d5dd49d02e670af3ebb0fa966431adfe47b6e74

    SHA256

    a796ad60a15252449f7266f404561386397ec45d23aa85ca2bda9c2137c9658d

    SHA512

    3d0886cf0d791fb9122dcf403944e5ec9ab6634a5e74587eeae3ae5b663fa0a727c2f79b86b9248d441f3306c25a11e0b66b793a48006d117566f37e149277e0

  • C:\Users\Admin\AppData\Local\Temp\woydiaq.exe
    Filesize

    74KB

    MD5

    479caad6c56fd4a045b25ed8b022a168

    SHA1

    f9a25d2c1fa81dd6405e7c3b44ae384981c79b08

    SHA256

    934223e2f6bee30cf5ae6f8775e902d76dadd16e5e38f81656113f8051904409

    SHA512

    f22562b741e7f11c8d4ab84bdf2a3dc5d1b673511766ae0f783f3c28e5354edcb3b01dde499c67f2f8d910206e10d7bdc750e3c984debdebc040ba298ed70472

  • C:\Users\Admin\AppData\Local\Temp\woydiaq.exe
    Filesize

    74KB

    MD5

    479caad6c56fd4a045b25ed8b022a168

    SHA1

    f9a25d2c1fa81dd6405e7c3b44ae384981c79b08

    SHA256

    934223e2f6bee30cf5ae6f8775e902d76dadd16e5e38f81656113f8051904409

    SHA512

    f22562b741e7f11c8d4ab84bdf2a3dc5d1b673511766ae0f783f3c28e5354edcb3b01dde499c67f2f8d910206e10d7bdc750e3c984debdebc040ba298ed70472

  • C:\Users\Admin\AppData\Local\Temp\woydiaq.exe
    Filesize

    74KB

    MD5

    479caad6c56fd4a045b25ed8b022a168

    SHA1

    f9a25d2c1fa81dd6405e7c3b44ae384981c79b08

    SHA256

    934223e2f6bee30cf5ae6f8775e902d76dadd16e5e38f81656113f8051904409

    SHA512

    f22562b741e7f11c8d4ab84bdf2a3dc5d1b673511766ae0f783f3c28e5354edcb3b01dde499c67f2f8d910206e10d7bdc750e3c984debdebc040ba298ed70472

  • C:\Users\Admin\AppData\Local\Temp\yjg2rci35ljn
    Filesize

    184KB

    MD5

    8304fa4e25ae8d02f3d1a254fd69c76a

    SHA1

    d5bb30d1ad247af463923a0c53abd0ee5ee26042

    SHA256

    a115618420c68eb6a78166081f5cb5cd48844cb221159baa0103467f4bcde88b

    SHA512

    abd8629f5da76a24a125fafb9080016ae33deae6216861d371b7a46b2c0857a1f67ff3b520fb929117c495b01691b8b7f694be91b685baaddb84995ed69ab23f

  • \Users\Admin\AppData\Local\Temp\woydiaq.exe
    Filesize

    74KB

    MD5

    479caad6c56fd4a045b25ed8b022a168

    SHA1

    f9a25d2c1fa81dd6405e7c3b44ae384981c79b08

    SHA256

    934223e2f6bee30cf5ae6f8775e902d76dadd16e5e38f81656113f8051904409

    SHA512

    f22562b741e7f11c8d4ab84bdf2a3dc5d1b673511766ae0f783f3c28e5354edcb3b01dde499c67f2f8d910206e10d7bdc750e3c984debdebc040ba298ed70472

  • \Users\Admin\AppData\Local\Temp\woydiaq.exe
    Filesize

    74KB

    MD5

    479caad6c56fd4a045b25ed8b022a168

    SHA1

    f9a25d2c1fa81dd6405e7c3b44ae384981c79b08

    SHA256

    934223e2f6bee30cf5ae6f8775e902d76dadd16e5e38f81656113f8051904409

    SHA512

    f22562b741e7f11c8d4ab84bdf2a3dc5d1b673511766ae0f783f3c28e5354edcb3b01dde499c67f2f8d910206e10d7bdc750e3c984debdebc040ba298ed70472

  • \Users\Admin\AppData\Local\Temp\woydiaq.exe
    Filesize

    74KB

    MD5

    479caad6c56fd4a045b25ed8b022a168

    SHA1

    f9a25d2c1fa81dd6405e7c3b44ae384981c79b08

    SHA256

    934223e2f6bee30cf5ae6f8775e902d76dadd16e5e38f81656113f8051904409

    SHA512

    f22562b741e7f11c8d4ab84bdf2a3dc5d1b673511766ae0f783f3c28e5354edcb3b01dde499c67f2f8d910206e10d7bdc750e3c984debdebc040ba298ed70472

  • memory/844-54-0x0000000076461000-0x0000000076463000-memory.dmp
    Filesize

    8KB

  • memory/1204-68-0x00000000068D0000-0x0000000006A73000-memory.dmp
    Filesize

    1.6MB

  • memory/1204-73-0x0000000006EF0000-0x0000000007017000-memory.dmp
    Filesize

    1.2MB

  • memory/1720-63-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1720-64-0x000000000041F150-mapping.dmp
  • memory/1720-69-0x00000000008C0000-0x0000000000BC3000-memory.dmp
    Filesize

    3.0MB

  • memory/1720-70-0x0000000000340000-0x0000000000354000-memory.dmp
    Filesize

    80KB

  • memory/1720-67-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1720-72-0x00000000003A0000-0x00000000003B4000-memory.dmp
    Filesize

    80KB

  • memory/2044-57-0x0000000000000000-mapping.dmp