Analysis

  • max time kernel
    147s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 01:32

General

  • Target

    ORDER_29741.exe

  • Size

    395KB

  • MD5

    b9c6aad2753d835eefeeae486fac18ba

  • SHA1

    f2744185e692cedec652edb07b8a174c34e9f327

  • SHA256

    e3f68e3679fc2ab587e712ce137e107318ebaa6bd5e724a76200bb10c945312b

  • SHA512

    1856ee344f1fecd55dc7823f0eb6c1999bd65a244da100b1fbf0550c9a7188c099854bf664f192a71b578a8ce5342854e1934fb2b8522082bc9412b23751fb1d

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

20w

Decoy

cofounder.technology

mrbajaf.com

xn--w9s874cfjq5fk.com

haliciogluhali.net

vanessadunfordhere.com

lookguy.win

91javac.com

goldennd.com

nwatheeliteteam.net

tumpukganda.com

clarservicios.com

koghana.com

workingwithroland.com

yellowsocialbox.com

under-dawg.com

sdtjtzyz.com

banditaerialproductions.com

newssmog.com

tefnmp.men

rebelialabel.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1424
    • C:\Users\Admin\AppData\Local\Temp\ORDER_29741.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER_29741.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:988
      • C:\Users\Admin\AppData\Local\Temp\ORDER_29741.exe
        "{path}"
        3⤵
          PID:832
        • C:\Users\Admin\AppData\Local\Temp\ORDER_29741.exe
          "{path}"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1132
      • C:\Windows\SysWOW64\cmstp.exe
        "C:\Windows\SysWOW64\cmstp.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:332
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\ORDER_29741.exe"
          3⤵
          • Deletes itself
          PID:1728

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\O4L7O-33\O4Llogim.jpeg

      Filesize

      66KB

      MD5

      06b0bce8f429241dc1fe611691da2aac

      SHA1

      38be2755b4c1fbcb68f468f2154d52b21cf8b449

      SHA256

      40e2e7560190517fbd0d8b571d237a3310188c7314253ffe26c309bd78a68fc3

      SHA512

      e7cef6ea36de4dd42215b35e6999b38783b07ec2c4c7e3fb16f458e8fde7a2f1b27cc319d7257eacf29c7e7bfd2e8a7141654c44f50ccc4f3aebf3152c09408b

    • C:\Users\Admin\AppData\Roaming\O4L7O-33\O4Llogri.ini

      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\O4L7O-33\O4Llogrv.ini

      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • memory/332-67-0x0000000000000000-mapping.dmp

    • memory/332-73-0x0000000000840000-0x00000000008D3000-memory.dmp

      Filesize

      588KB

    • memory/332-72-0x0000000001F20000-0x0000000002223000-memory.dmp

      Filesize

      3.0MB

    • memory/332-71-0x00000000000D0000-0x00000000000FA000-memory.dmp

      Filesize

      168KB

    • memory/332-70-0x0000000000B00000-0x0000000000B18000-memory.dmp

      Filesize

      96KB

    • memory/988-55-0x00000000741E0000-0x000000007478B000-memory.dmp

      Filesize

      5.7MB

    • memory/988-54-0x0000000075C71000-0x0000000075C73000-memory.dmp

      Filesize

      8KB

    • memory/988-61-0x0000000000369000-0x000000000037A000-memory.dmp

      Filesize

      68KB

    • memory/1132-60-0x000000000041B680-mapping.dmp

    • memory/1132-64-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1132-65-0x0000000000180000-0x0000000000194000-memory.dmp

      Filesize

      80KB

    • memory/1132-63-0x0000000000C00000-0x0000000000F03000-memory.dmp

      Filesize

      3.0MB

    • memory/1132-59-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1132-57-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1132-56-0x0000000000400000-0x000000000042A000-memory.dmp

      Filesize

      168KB

    • memory/1424-66-0x0000000004AD0000-0x0000000004BAE000-memory.dmp

      Filesize

      888KB

    • memory/1424-74-0x0000000004D50000-0x0000000004E3E000-memory.dmp

      Filesize

      952KB

    • memory/1728-69-0x0000000000000000-mapping.dmp