Analysis

  • max time kernel
    152s
  • max time network
    136s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 01:29

General

  • Target

    New PI PL.exe

  • Size

    945KB

  • MD5

    332e036148c15d2453735b513bb8d693

  • SHA1

    ffe088da337a5d87baeb1f3de49f83ff6a607c0a

  • SHA256

    d4cca60154fcc667ada19dffbac16f84b51691a540daf850a766b91bd46544fe

  • SHA512

    099a9ad6dd681e580e7ab0ab1798a51ccb9ce92a9ed001e7a8e49f0c57a714932cbc20c06670683fdb67be1ab88ba4b54e4f67568884deed1bc8921ecee4aed9

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

wus

Decoy

generativecoaching.net

skillmosaic.com

practicalmaster.com

12aminmiami.com

instagramsupport.online

mainelse.net

qqysmr.com

wealthxd.com

videoadscreator.com

dltzscl.com

cotaforjulyans.com

forcend.com

shinjukufilm.com

bsq30.com

dragonsrose.net

loganbuys.com

wwwfitnessymusica.com

microbladingdublin.com

corporateiconic.com

sunshinegroupnyc.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\New PI PL.exe
      "C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"
      2⤵
      • Checks BIOS information in registry
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1120
      • C:\Users\Admin\AppData\Local\Temp\New PI PL.exe
        "C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1180
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\New PI PL.exe"
        3⤵
        • Deletes itself
        PID:280
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/280-70-0x0000000000000000-mapping.dmp

    • memory/1120-54-0x0000000000DC0000-0x0000000000EB2000-memory.dmp

      Filesize

      968KB

    • memory/1120-55-0x00000000759E1000-0x00000000759E3000-memory.dmp

      Filesize

      8KB

    • memory/1120-56-0x0000000000330000-0x000000000033A000-memory.dmp

      Filesize

      40KB

    • memory/1120-57-0x00000000042C0000-0x000000000430C000-memory.dmp

      Filesize

      304KB

    • memory/1120-58-0x0000000004480000-0x00000000044B4000-memory.dmp

      Filesize

      208KB

    • memory/1180-66-0x0000000000920000-0x0000000000C23000-memory.dmp

      Filesize

      3.0MB

    • memory/1180-63-0x000000000041E290-mapping.dmp

    • memory/1180-65-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1180-60-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1180-68-0x0000000000190000-0x00000000001A4000-memory.dmp

      Filesize

      80KB

    • memory/1180-62-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1180-59-0x0000000000400000-0x000000000042D000-memory.dmp

      Filesize

      180KB

    • memory/1396-75-0x0000000004AB0000-0x0000000004B78000-memory.dmp

      Filesize

      800KB

    • memory/1396-67-0x00000000049F0000-0x0000000004AA4000-memory.dmp

      Filesize

      720KB

    • memory/2044-69-0x0000000000000000-mapping.dmp

    • memory/2044-72-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/2044-73-0x0000000000810000-0x0000000000B13000-memory.dmp

      Filesize

      3.0MB

    • memory/2044-74-0x0000000000630000-0x00000000006C3000-memory.dmp

      Filesize

      588KB

    • memory/2044-71-0x0000000000BE0000-0x0000000000BE8000-memory.dmp

      Filesize

      32KB