Analysis

  • max time kernel
    174s
  • max time network
    192s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 00:52

General

  • Target

    Quotation.exe

  • Size

    378KB

  • MD5

    f3cf72f1ae6aa14ad0da0ee454e42bfb

  • SHA1

    93c3d771808d2c5a4ad34e9cebe3fab5da335069

  • SHA256

    3837dc32928e8556207e8dafb872968279682dc4a848d09f73823818d2fb7dff

  • SHA512

    4a52b43f19bdfbb4614ae510c0e1aea414d676ce7d5b0120c66e14c791498d9ee9e458aafe74885f7b62e355139bacb46541f92eddc6b85836dcb4dc36cb984a

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

m6x

Decoy

990939.top

dhluxuryconsulting.com

muapnvnsfr.com

homder.com

valveiran.com

alkhaleejtrading.net

jekweiss.com

kevinklasmanmusic.com

buyilovebacon.com

nq227.com

cryptrproject.com

medicine.mba

nufilter.info

highway99restorations.com

phytohealthkits.com

accentuatephotography.com

tradeclimber.com

yasseralm.com

ito-agri.com

divandaman.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 2 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\Quotation.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
      2⤵
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:3192
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Quotation.exe"
        3⤵
          PID:4528
        • C:\Windows\SysWOW64\cmd.exe
          /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
          3⤵
            PID:3656

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      2
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      Peripheral Device Discovery

      1
      T1120

      System Information Discovery

      1
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DB1
        Filesize

        40KB

        MD5

        b608d407fc15adea97c26936bc6f03f6

        SHA1

        953e7420801c76393902c0d6bb56148947e41571

        SHA256

        b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

        SHA512

        cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

      • memory/3148-135-0x00000000032C0000-0x00000000033E3000-memory.dmp
        Filesize

        1.1MB

      • memory/3148-142-0x00000000086F0000-0x0000000008839000-memory.dmp
        Filesize

        1.3MB

      • memory/3192-131-0x00000000052D0000-0x0000000005874000-memory.dmp
        Filesize

        5.6MB

      • memory/3192-132-0x00000000005B0000-0x00000000005DA000-memory.dmp
        Filesize

        168KB

      • memory/3192-133-0x0000000005880000-0x0000000005BCA000-memory.dmp
        Filesize

        3.3MB

      • memory/3192-134-0x0000000000A00000-0x0000000000A14000-memory.dmp
        Filesize

        80KB

      • memory/3192-130-0x0000000000180000-0x00000000001E4000-memory.dmp
        Filesize

        400KB

      • memory/3656-143-0x0000000000000000-mapping.dmp
      • memory/4528-140-0x0000000000000000-mapping.dmp
      • memory/4784-136-0x0000000000000000-mapping.dmp
      • memory/4784-141-0x0000000002400000-0x0000000002493000-memory.dmp
        Filesize

        588KB

      • memory/4784-139-0x0000000002670000-0x00000000029BA000-memory.dmp
        Filesize

        3.3MB

      • memory/4784-138-0x0000000000640000-0x000000000066A000-memory.dmp
        Filesize

        168KB

      • memory/4784-137-0x0000000000EE0000-0x0000000000EEC000-memory.dmp
        Filesize

        48KB