Analysis

  • max time kernel
    153s
  • max time network
    200s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 12:08

General

  • Target

    ORDER-#4536 ,pdf.exe

  • Size

    504KB

  • MD5

    6a094a17412972fa961de3851585c5d9

  • SHA1

    d4c4f6f3dd9c59fad99b4a419b3b30f1b7c4bb15

  • SHA256

    50f8d8b5cbbad3f2a1d4a25b84553ba285f49318ab3dbb8d436b6709582997e8

  • SHA512

    6e05941dd561baaa89e74a7461247b5e83e3adab5e0ad6d26e796e8422ebc6fa617c0c8461cb97801e65693de50adc18b138c067d0a01a8b1c83567fff1740ba

Malware Config

Extracted

Family

formbook

Version

3.9

Campaign

te

Decoy

165whc.info

qdbfqfphjidqgtbttnq.com

theforceforsakens.com

septsix.com

meinnatura.com

markcici.com

rh-tv.com

yangzhie288.com

crystalent.biz

ipearlvoyager.com

depositvoucher.accountant

xn--g5ty9lgeu39hdrv5sm.com

newitemof.info

bombkitty.com

lewesdelawarerealestate.com

9c1nine.loan

ramrajindustries.com

standardpitbullpups.com

gentlestitches.com

dotruckbig.live

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1008
      • C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2020
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1216
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\ORDER-#4536 ,pdf.exe"
        3⤵
        • Deletes itself
        PID:2028

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\50N8002E\50Nlogim.jpeg
    Filesize

    73KB

    MD5

    6c46dc164f168c395b6e7b8660b83b5f

    SHA1

    3f802503862c5361a6ec9ca464f4031d2960793e

    SHA256

    df32650cf67ddd19afc808e06bdc3d71ed5cf6520d2c2af09cae3434b696d3af

    SHA512

    7f041cfbef0393532303d9e4a91cc19987d4e459195f8fdca518fc39f453b7ccd2ae318275c7c7cf8f3d78245aed5c328815dc8a43bddd096d1828f76b83c052

  • C:\Users\Admin\AppData\Roaming\50N8002E\50Nlogri.ini
    Filesize

    40B

    MD5

    d63a82e5d81e02e399090af26db0b9cb

    SHA1

    91d0014c8f54743bba141fd60c9d963f869d76c9

    SHA256

    eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

    SHA512

    38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

  • C:\Users\Admin\AppData\Roaming\50N8002E\50Nlogrv.ini
    Filesize

    40B

    MD5

    ba3b6bc807d4f76794c4b81b09bb9ba5

    SHA1

    24cb89501f0212ff3095ecc0aba97dd563718fb1

    SHA256

    6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

    SHA512

    ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

  • memory/1008-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp
    Filesize

    8KB

  • memory/1008-55-0x0000000073F90000-0x000000007453B000-memory.dmp
    Filesize

    5.7MB

  • memory/1216-72-0x0000000000AE0000-0x0000000000B73000-memory.dmp
    Filesize

    588KB

  • memory/1216-66-0x0000000000000000-mapping.dmp
  • memory/1216-71-0x00000000021A0000-0x00000000024A3000-memory.dmp
    Filesize

    3.0MB

  • memory/1216-70-0x0000000000080000-0x00000000000AA000-memory.dmp
    Filesize

    168KB

  • memory/1216-69-0x0000000000C90000-0x0000000000D94000-memory.dmp
    Filesize

    1.0MB

  • memory/1284-65-0x00000000049F0000-0x0000000004B4D000-memory.dmp
    Filesize

    1.4MB

  • memory/1284-73-0x0000000006B20000-0x0000000006C4D000-memory.dmp
    Filesize

    1.2MB

  • memory/2020-62-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2020-63-0x0000000000C10000-0x0000000000F13000-memory.dmp
    Filesize

    3.0MB

  • memory/2020-64-0x0000000000180000-0x0000000000194000-memory.dmp
    Filesize

    80KB

  • memory/2020-59-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2020-60-0x000000000041B680-mapping.dmp
  • memory/2020-57-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2020-56-0x0000000000400000-0x000000000042A000-memory.dmp
    Filesize

    168KB

  • memory/2028-68-0x0000000000000000-mapping.dmp