Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 12:01

General

  • Target

    PO #78574764 June 4-2020.exe

  • Size

    422KB

  • MD5

    130322a1fd284d7d585221381038c584

  • SHA1

    620933b28bb9de45a0f72a415c0bfc85efcbb442

  • SHA256

    2bd1995c8c2b3f35906807ce4697151cf801af339579cd7b86e467df6474dafa

  • SHA512

    3eaacdf8edd846d27059a04217540f561f8e592b537ce57412b45b67f797b7b25f8f76b7158ada512567a6f642911aa425475da656c29d7524d0995684d466d5

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

i0qi

Decoy

mytakeawaybox.com

goutaihuo.com

kuzey.site

uppertenpiercings.amsterdam

honeygrandpa.com

jenniferabramslaw.com

ncarian.com

heavilymeditatedhouston.com

gsbjyzx.com

akisanblog.com

taoyuanreed.com

jasperrvservices.com

yabbanet.com

myhealthfuldiet.com

flipdigitalcoins.com

toes.photos

shoottillyoumiss.com

maserental.com

smarteacher.net

hamdimagdeco.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\PO #78574764 June 4-2020.exe
      "C:\Users\Admin\AppData\Local\Temp\PO #78574764 June 4-2020.exe"
      2⤵
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:4144
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2688
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:4636
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:4016
          • C:\Windows\SysWOW64\autofmt.exe
            "C:\Windows\SysWOW64\autofmt.exe"
            2⤵
              PID:4256
            • C:\Windows\SysWOW64\autofmt.exe
              "C:\Windows\SysWOW64\autofmt.exe"
              2⤵
                PID:4528
              • C:\Windows\SysWOW64\colorcpl.exe
                "C:\Windows\SysWOW64\colorcpl.exe"
                2⤵
                • Adds Run key to start application
                • Suspicious use of SetThreadContext
                • Drops file in Program Files directory
                • Modifies Internet Explorer settings
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2252
                • C:\Windows\SysWOW64\cmd.exe
                  /c del "C:\Users\Admin\AppData\Local\Temp\PO #78574764 June 4-2020.exe"
                  3⤵
                    PID:3740
                  • C:\Windows\SysWOW64\cmd.exe
                    /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
                    3⤵
                      PID:5088
                    • C:\Program Files\Mozilla Firefox\Firefox.exe
                      "C:\Program Files\Mozilla Firefox\Firefox.exe"
                      3⤵
                        PID:2188

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Persistence

                  Registry Run Keys / Startup Folder

                  1
                  T1060

                  Defense Evasion

                  Modify Registry

                  2
                  T1112

                  Credential Access

                  Credentials in Files

                  1
                  T1081

                  Discovery

                  Query Registry

                  1
                  T1012

                  Peripheral Device Discovery

                  1
                  T1120

                  System Information Discovery

                  1
                  T1082

                  Collection

                  Data from Local System

                  1
                  T1005

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\DB1
                    Filesize

                    40KB

                    MD5

                    b608d407fc15adea97c26936bc6f03f6

                    SHA1

                    953e7420801c76393902c0d6bb56148947e41571

                    SHA256

                    b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

                    SHA512

                    cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

                  • memory/2252-140-0x00000000008B0000-0x00000000008DD000-memory.dmp
                    Filesize

                    180KB

                  • memory/2252-142-0x0000000002660000-0x00000000026F3000-memory.dmp
                    Filesize

                    588KB

                  • memory/2252-139-0x00000000027B0000-0x0000000002AFA000-memory.dmp
                    Filesize

                    3.3MB

                  • memory/2252-138-0x0000000000810000-0x0000000000829000-memory.dmp
                    Filesize

                    100KB

                  • memory/2252-137-0x0000000000000000-mapping.dmp
                  • memory/3048-136-0x0000000008010000-0x0000000008167000-memory.dmp
                    Filesize

                    1.3MB

                  • memory/3048-143-0x00000000085D0000-0x0000000008712000-memory.dmp
                    Filesize

                    1.3MB

                  • memory/3740-141-0x0000000000000000-mapping.dmp
                  • memory/4144-135-0x0000000004C00000-0x00000000051A4000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4144-134-0x0000000005760000-0x0000000005AAA000-memory.dmp
                    Filesize

                    3.3MB

                  • memory/4144-131-0x0000000000160000-0x00000000001CE000-memory.dmp
                    Filesize

                    440KB

                  • memory/4144-133-0x0000000004C00000-0x00000000051A4000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/4144-132-0x00000000051B0000-0x0000000005754000-memory.dmp
                    Filesize

                    5.6MB

                  • memory/5088-144-0x0000000000000000-mapping.dmp