Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 01:19

General

  • Target

    RFQ-MNAMR-001RB-WhastsAAp Images.exe

  • Size

    398KB

  • MD5

    239efcf744fc1e906b704d4eebe4a962

  • SHA1

    c8c0fe13941c237cd72c2eb3adcfc13f9513d32d

  • SHA256

    aae9b362789cdf8a185d9b963cb3b0ba5d7f5599285cecd8625944168232c42c

  • SHA512

    affe8bdcfbdc3e2554f2b8c887a9d417a69b5e031f7433ecf8971cc14a55bbabb70fbacd495a23d355662a679fbca321c38eb46e37949ea51e2e290ad7558af9

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

xcm

Decoy

xn--rhq5es99j.com

storage-download-fast.review

campingfamilly.com

rientbottcieux.info

2015z.com

999izo.info

guojiafangshui.com

jpaecwra.com

evergreenmga.net

semprebellissima.store

meizin01.com

bangladesherkhobor.net

rivercoveresidencessg.com

carbonfibercrew.com

1rbld2.biz

nikolatesla.review

erlandsonsbrygga.com

cursosreikiadistancia.com

centraldemotorersltda.com

shelskysbrooklynbagels.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:8
    • C:\Users\Admin\AppData\Local\Temp\RFQ-MNAMR-001RB-WhastsAAp Images.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ-MNAMR-001RB-WhastsAAp Images.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:4876
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\fgySYm" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD621.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:4496
      • C:\Users\Admin\AppData\Local\Temp\RFQ-MNAMR-001RB-WhastsAAp Images.exe
        "{path}"
        3⤵
          PID:4460
        • C:\Users\Admin\AppData\Local\Temp\RFQ-MNAMR-001RB-WhastsAAp Images.exe
          "{path}"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4348
      • C:\Windows\SysWOW64\cmstp.exe
        "C:\Windows\SysWOW64\cmstp.exe"
        2⤵
        • Adds policy Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        • System policy modification
        PID:4340
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\RFQ-MNAMR-001RB-WhastsAAp Images.exe"
          3⤵
            PID:232
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:1112

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\DB1
          Filesize

          40KB

          MD5

          b608d407fc15adea97c26936bc6f03f6

          SHA1

          953e7420801c76393902c0d6bb56148947e41571

          SHA256

          b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

          SHA512

          cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

        • C:\Users\Admin\AppData\Local\Temp\tmpD621.tmp
          Filesize

          1KB

          MD5

          d2427523e564975841726be36764a0df

          SHA1

          abee13bbbd100f875ceacf5f393b70cfb6fbf49f

          SHA256

          80d020ab58fc4de7cbc065ecd9693fdcfa9f8b6a2ba4312c839bda4e3d9d273b

          SHA512

          dfecc971e3b732a2dc8885fb69bbc7468b196ef85ba277bb57d801447f1d30f47131bd89cd1a2df6d01ff1ef773a3b3fddb8d5062f3755ab919f54153bbb83be

        • memory/8-147-0x0000000008360000-0x00000000084A0000-memory.dmp
          Filesize

          1.2MB

        • memory/8-140-0x0000000007D90000-0x0000000007EDF000-memory.dmp
          Filesize

          1.3MB

        • memory/232-145-0x0000000000000000-mapping.dmp
        • memory/1112-148-0x0000000000000000-mapping.dmp
        • memory/4340-142-0x0000000000720000-0x0000000000736000-memory.dmp
          Filesize

          88KB

        • memory/4340-146-0x0000000002D10000-0x0000000002DA3000-memory.dmp
          Filesize

          588KB

        • memory/4340-144-0x0000000002E80000-0x00000000031CA000-memory.dmp
          Filesize

          3.3MB

        • memory/4340-143-0x0000000000D70000-0x0000000000D9A000-memory.dmp
          Filesize

          168KB

        • memory/4340-141-0x0000000000000000-mapping.dmp
        • memory/4348-134-0x0000000000000000-mapping.dmp
        • memory/4348-139-0x00000000012B0000-0x00000000012C4000-memory.dmp
          Filesize

          80KB

        • memory/4348-138-0x0000000001780000-0x0000000001ACA000-memory.dmp
          Filesize

          3.3MB

        • memory/4348-137-0x0000000000400000-0x000000000042A000-memory.dmp
          Filesize

          168KB

        • memory/4348-135-0x0000000000400000-0x000000000042A000-memory.dmp
          Filesize

          168KB

        • memory/4460-133-0x0000000000000000-mapping.dmp
        • memory/4496-131-0x0000000000000000-mapping.dmp
        • memory/4876-130-0x0000000075150000-0x0000000075701000-memory.dmp
          Filesize

          5.7MB