Analysis

  • max time kernel
    152s
  • max time network
    156s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    21-05-2022 12:15

General

  • Target

    Purchase Order 564537737 May.exe

  • Size

    411KB

  • MD5

    bf15960dd7174427df765fd9f9203521

  • SHA1

    cb1de1df0c3b1a1cc70a28629ac51d67901b17aa

  • SHA256

    9187706072f008a27c26421791f57ec33a59b44b012500b2db3eeb48136fb2da

  • SHA512

    7e8b9907233234440135f27ad813db97e20790baf8cb92949ae9185fa09cb4b7b0da35b6da2b33f3ac64a33545f32f959d90d73f7a6a4f14988c8ac3fd005074

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

i0qi

Decoy

mytakeawaybox.com

goutaihuo.com

kuzey.site

uppertenpiercings.amsterdam

honeygrandpa.com

jenniferabramslaw.com

ncarian.com

heavilymeditatedhouston.com

gsbjyzx.com

akisanblog.com

taoyuanreed.com

jasperrvservices.com

yabbanet.com

myhealthfuldiet.com

flipdigitalcoins.com

toes.photos

shoottillyoumiss.com

maserental.com

smarteacher.net

hamdimagdeco.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 2 IoCs
  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2832
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order 564537737 May.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order 564537737 May.exe"
      2⤵
      • Maps connected drives based on registry
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:5012
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4924
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order 564537737 May.exe"
        3⤵
          PID:5096

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    Peripheral Device Discovery

    1
    T1120

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2832-136-0x0000000008790000-0x00000000088C6000-memory.dmp
      Filesize

      1.2MB

    • memory/2832-143-0x0000000008A60000-0x0000000008BA5000-memory.dmp
      Filesize

      1.3MB

    • memory/4924-139-0x0000000002710000-0x0000000002A5A000-memory.dmp
      Filesize

      3.3MB

    • memory/4924-137-0x0000000000000000-mapping.dmp
    • memory/4924-138-0x0000000000DA0000-0x0000000000DF7000-memory.dmp
      Filesize

      348KB

    • memory/4924-140-0x0000000000350000-0x000000000037D000-memory.dmp
      Filesize

      180KB

    • memory/4924-142-0x0000000002450000-0x00000000024E3000-memory.dmp
      Filesize

      588KB

    • memory/5012-133-0x0000000005980000-0x00000000059AD000-memory.dmp
      Filesize

      180KB

    • memory/5012-134-0x00000000064A0000-0x00000000067EA000-memory.dmp
      Filesize

      3.3MB

    • memory/5012-135-0x0000000005940000-0x0000000005EE4000-memory.dmp
      Filesize

      5.6MB

    • memory/5012-132-0x0000000005940000-0x0000000005EE4000-memory.dmp
      Filesize

      5.6MB

    • memory/5012-130-0x0000000000D90000-0x0000000000DFE000-memory.dmp
      Filesize

      440KB

    • memory/5012-131-0x0000000005EF0000-0x0000000006494000-memory.dmp
      Filesize

      5.6MB

    • memory/5096-141-0x0000000000000000-mapping.dmp