Analysis

  • max time kernel
    181s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 00:52

General

  • Target

    Quotation list.exe

  • Size

    378KB

  • MD5

    3617db6af880e252d22998f0172c4b1b

  • SHA1

    debf933d05217678743203fb00dff0b86dbc03be

  • SHA256

    8256c24d02c5a109077b512ce3b45d7f95bf38cc01c33a968bea89f244f48e40

  • SHA512

    50567cf8853a9b58dc8b23aa4a3bbb5abb9a449024751eadedda1c3bba935bcd61d8a58568e7006f2ba70782754d3a49a115f5974812e652499592751d977245

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

m6x

Decoy

990939.top

dhluxuryconsulting.com

muapnvnsfr.com

homder.com

valveiran.com

alkhaleejtrading.net

jekweiss.com

kevinklasmanmusic.com

buyilovebacon.com

nq227.com

cryptrproject.com

medicine.mba

nufilter.info

highway99restorations.com

phytohealthkits.com

accentuatephotography.com

tradeclimber.com

yasseralm.com

ito-agri.com

divandaman.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Quotation list.exe
    "C:\Users\Admin\AppData\Local\Temp\Quotation list.exe"
    1⤵
    • Maps connected drives based on registry
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of AdjustPrivilegeToken
    PID:2548
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Quotation list.exe"
        3⤵
          PID:1752
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:2120

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DB1
        Filesize

        40KB

        MD5

        b608d407fc15adea97c26936bc6f03f6

        SHA1

        953e7420801c76393902c0d6bb56148947e41571

        SHA256

        b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

        SHA512

        cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

      • memory/1752-140-0x0000000000000000-mapping.dmp
      • memory/2120-143-0x0000000000000000-mapping.dmp
      • memory/2548-131-0x0000000005870000-0x0000000005E14000-memory.dmp
        Filesize

        5.6MB

      • memory/2548-132-0x00000000052C0000-0x0000000005864000-memory.dmp
        Filesize

        5.6MB

      • memory/2548-133-0x0000000005FD0000-0x000000000631A000-memory.dmp
        Filesize

        3.3MB

      • memory/2548-134-0x00000000052C0000-0x0000000005864000-memory.dmp
        Filesize

        5.6MB

      • memory/2548-130-0x0000000000690000-0x00000000006F4000-memory.dmp
        Filesize

        400KB

      • memory/3144-135-0x0000000007EF0000-0x0000000008088000-memory.dmp
        Filesize

        1.6MB

      • memory/3144-142-0x00000000081B0000-0x00000000082CA000-memory.dmp
        Filesize

        1.1MB

      • memory/4972-136-0x0000000000000000-mapping.dmp
      • memory/4972-139-0x00000000030E0000-0x000000000342A000-memory.dmp
        Filesize

        3.3MB

      • memory/4972-141-0x0000000002F80000-0x0000000003013000-memory.dmp
        Filesize

        588KB

      • memory/4972-138-0x0000000001230000-0x000000000125A000-memory.dmp
        Filesize

        168KB

      • memory/4972-137-0x0000000000120000-0x0000000000132000-memory.dmp
        Filesize

        72KB