Analysis

  • max time kernel
    187s
  • max time network
    198s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 11:49

General

  • Target

    Purchase Order 77809 for acknowledgment.exe

  • Size

    281KB

  • MD5

    48884ebe9169015be3e42f68ad14d7be

  • SHA1

    4c0fe63fe5090ed8ac71f3af10dfc84c9b8b0f5e

  • SHA256

    b36d0b4952457c89f455f2333a815b0a1d7530a108bf43ea0ef1a7c17fe2774b

  • SHA512

    9258362c161b710264767cb180913c3190c6594961d40d1fdc976babfeeb4494aab31678cc9eb75662bf48e1055c8d62de0c8c9d2f4061e3917afb325c6bc0b4

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

y22

Decoy

hashafriyat.com

autoaccessorieshub.com

simelautomazioni.com

bulkappothecary.com

streaminglowcost.com

pixelraps.com

yyy9928.com

pigmansion.net

keyunix.com

bjbangshou.com

mindfulrace.com

fibuv.life

cambridgedesignpartnership.com

plumbeus.com

somebodydial911.com

atrishq.com

circcountry.com

ellenandjames.info

jeeprevivalstore.com

thetouchofjo.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Purchase Order 77809 for acknowledgment.exe
    "C:\Users\Admin\AppData\Local\Temp\Purchase Order 77809 for acknowledgment.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1320
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order 77809 for acknowledgment.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order 77809 for acknowledgment.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1128
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order 77809 for acknowledgment.exe"
        3⤵
        • Deletes itself
        PID:664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\1P02057U\1P0logim.jpeg

    Filesize

    64KB

    MD5

    3272b1e8362cdc040f17ad83d6db64b9

    SHA1

    c06d4edf1813e8725e6f2a9b3d59651bbcf468e6

    SHA256

    bcb3f0c87e302be04433c83e0fa9a917cdcfad0cc0a88eced6e033525f4b19a8

    SHA512

    797833b0955a1d8103fe10c8afb55ccc1594ff7e3725e6ecdf6754cd744ce540df4f1ec062199a048aba145099aaf8f70d55e0bb7d952678839231979406cbca

  • C:\Users\Admin\AppData\Roaming\1P02057U\1P0logri.ini

    Filesize

    40B

    MD5

    d63a82e5d81e02e399090af26db0b9cb

    SHA1

    91d0014c8f54743bba141fd60c9d963f869d76c9

    SHA256

    eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

    SHA512

    38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

  • C:\Users\Admin\AppData\Roaming\1P02057U\1P0logrv.ini

    Filesize

    40B

    MD5

    ba3b6bc807d4f76794c4b81b09bb9ba5

    SHA1

    24cb89501f0212ff3095ecc0aba97dd563718fb1

    SHA256

    6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

    SHA512

    ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

  • memory/664-71-0x0000000000000000-mapping.dmp

  • memory/896-68-0x0000000000000000-mapping.dmp

  • memory/896-75-0x0000000002180000-0x0000000002213000-memory.dmp

    Filesize

    588KB

  • memory/896-74-0x0000000002450000-0x0000000002753000-memory.dmp

    Filesize

    3.0MB

  • memory/896-73-0x0000000000080000-0x00000000000AA000-memory.dmp

    Filesize

    168KB

  • memory/896-72-0x0000000000960000-0x0000000000BE1000-memory.dmp

    Filesize

    2.5MB

  • memory/896-70-0x0000000075261000-0x0000000075263000-memory.dmp

    Filesize

    8KB

  • memory/1128-59-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1128-66-0x0000000000190000-0x00000000001A4000-memory.dmp

    Filesize

    80KB

  • memory/1128-65-0x0000000000A00000-0x0000000000D03000-memory.dmp

    Filesize

    3.0MB

  • memory/1128-62-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1128-63-0x000000000041B750-mapping.dmp

  • memory/1128-60-0x0000000000400000-0x000000000042A000-memory.dmp

    Filesize

    168KB

  • memory/1220-67-0x0000000005DD0000-0x0000000005F51000-memory.dmp

    Filesize

    1.5MB

  • memory/1220-76-0x0000000006010000-0x0000000006175000-memory.dmp

    Filesize

    1.4MB

  • memory/1320-54-0x0000000001070000-0x00000000010BC000-memory.dmp

    Filesize

    304KB

  • memory/1320-58-0x0000000000DB0000-0x0000000000DE8000-memory.dmp

    Filesize

    224KB

  • memory/1320-57-0x0000000000390000-0x0000000000398000-memory.dmp

    Filesize

    32KB

  • memory/1320-56-0x0000000075F21000-0x0000000075F23000-memory.dmp

    Filesize

    8KB

  • memory/1320-55-0x0000000000430000-0x0000000000466000-memory.dmp

    Filesize

    216KB