Analysis

  • max time kernel
    149s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 10:50

General

  • Target

    009888389998789290000-pdf.exe

  • Size

    876KB

  • MD5

    c4dc14e8754c36300ae98fa8b4369a40

  • SHA1

    9cd8e279dff02db6ffb9199cf6cb4ff5fc07cc37

  • SHA256

    c303fb93eba5623184f5bfb8fefbea2458e25ead795e6d5c5d5e78e921c6490e

  • SHA512

    ba4280059eb153941d0c06533542a10d25f5c95c45bbebce620f042560df2557e1eae6ea3a405d6663c9552eb8dc49bb1cfccb2659e834a06fac4587373c7382

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

hm2

Decoy

vodu.ltd

arauderghem.net

bluebackpage.com

cheapairmaxsaleclearance.com

soldiersofarts.com

fbservice.info

x9e7x7.info

davidhenkel.com

plantrak.net

66sbleiv.com

cartierringprice.com

roupeiroblog.com

thxcn.com

baboondynasty.win

thecloudm.com

everythingreviews.net

zimmermansales.net

movie.kitchen

im.help

geebzor.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 1 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1380
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:624
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\009888389998789290000-pdf.exe"
        3⤵
        • Deletes itself
        PID:1696

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/624-63-0x0000000000070000-0x000000000009A000-memory.dmp
    Filesize

    168KB

  • memory/624-60-0x0000000000000000-mapping.dmp
  • memory/624-62-0x0000000000C20000-0x0000000000C46000-memory.dmp
    Filesize

    152KB

  • memory/624-64-0x0000000002050000-0x0000000002353000-memory.dmp
    Filesize

    3.0MB

  • memory/624-65-0x0000000002360000-0x00000000023F3000-memory.dmp
    Filesize

    588KB

  • memory/1256-59-0x0000000004A00000-0x0000000004B4C000-memory.dmp
    Filesize

    1.3MB

  • memory/1256-66-0x0000000004C30000-0x0000000004D4C000-memory.dmp
    Filesize

    1.1MB

  • memory/1380-55-0x000000000041B630-mapping.dmp
  • memory/1380-57-0x00000000008A0000-0x0000000000BA3000-memory.dmp
    Filesize

    3.0MB

  • memory/1380-58-0x0000000000350000-0x0000000000364000-memory.dmp
    Filesize

    80KB

  • memory/1696-61-0x0000000000000000-mapping.dmp
  • memory/1728-56-0x0000000000260000-0x0000000000269000-memory.dmp
    Filesize

    36KB

  • memory/1728-54-0x0000000075AE1000-0x0000000075AE3000-memory.dmp
    Filesize

    8KB