Analysis

  • max time kernel
    147s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 18:52

General

  • Target

    RFQ_august.exe

  • Size

    756KB

  • MD5

    f5bf9905ff7c573695fe1e53a1338e5c

  • SHA1

    1d531327f162c4bb844f42694fe5da4f95dc9510

  • SHA256

    e6ef5385235001a8743ac0ee83f839abdd66abed79cff1429020270168bd9357

  • SHA512

    f382aa021ee9ece8ea92fda10391bb540b11f9c172f76c85745b12169de1d9aec0edd8a9649d6033edf5c049c98ff00f6b605b604482d1b25cf343536edba17e

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

emh

Decoy

sweetmiya.com

zsyzm.com

carpediem.immo

sparkconfections.com

oliverezechi.net

wearephoenixtraining.com

artistxpressions.com

kesfetmeninkeyfi.com

kasvomaskitnetista.com

mertzlife.com

vcbuild.world

mwessentialcleaningservice.com

fairresale.com

dermot.online

impentri.com

bestsanitizingservice.com

210wscottstj.info

camilafinale.com

pepperhaul.com

centrobiblicomoradasanta.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 3 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Deletes itself 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\RFQ_august.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ_august.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1856
      • C:\Users\Admin\AppData\Local\Temp\RFQ_august.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ_august.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1672
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1964
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\RFQ_august.exe"
        3⤵
        • Deletes itself
        PID:1956
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1920

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\690A776U\690logim.jpeg
      Filesize

      67KB

      MD5

      468e98dea14e0a4ef229fe406690db6d

      SHA1

      48b399fd501e78f158998870ddc8bdb12feaba0b

      SHA256

      690072cde17e3bc1befff100e2acad0bbc1ccd10cd75c4b9a8e398efe780daf2

      SHA512

      92937a90e26f9e4de76f4bb5874581fc68412fa001aec9abc211995ca50793598ce6f04ec6cce7a8ffd37e65bd778df13d25c5da65e7b59dd50ce8d1c1f5865c

    • C:\Users\Admin\AppData\Roaming\690A776U\690logrf.ini
      Filesize

      40B

      MD5

      2f245469795b865bdd1b956c23d7893d

      SHA1

      6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

      SHA256

      1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

      SHA512

      909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

    • C:\Users\Admin\AppData\Roaming\690A776U\690logri.ini
      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\690A776U\690logrv.ini
      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • memory/1248-67-0x00000000040D0000-0x0000000004214000-memory.dmp
      Filesize

      1.3MB

    • memory/1248-75-0x0000000006070000-0x000000000613A000-memory.dmp
      Filesize

      808KB

    • memory/1672-66-0x0000000000180000-0x0000000000194000-memory.dmp
      Filesize

      80KB

    • memory/1672-59-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/1672-63-0x000000000041E340-mapping.dmp
    • memory/1672-65-0x0000000000A00000-0x0000000000D03000-memory.dmp
      Filesize

      3.0MB

    • memory/1672-62-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/1672-60-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/1856-58-0x0000000000C60000-0x0000000000CA2000-memory.dmp
      Filesize

      264KB

    • memory/1856-54-0x00000000012B0000-0x0000000001372000-memory.dmp
      Filesize

      776KB

    • memory/1856-57-0x0000000005770000-0x00000000057DE000-memory.dmp
      Filesize

      440KB

    • memory/1856-56-0x0000000000960000-0x0000000000970000-memory.dmp
      Filesize

      64KB

    • memory/1856-55-0x0000000075CE1000-0x0000000075CE3000-memory.dmp
      Filesize

      8KB

    • memory/1956-70-0x0000000000000000-mapping.dmp
    • memory/1964-71-0x0000000000760000-0x000000000076E000-memory.dmp
      Filesize

      56KB

    • memory/1964-72-0x0000000000090000-0x00000000000BD000-memory.dmp
      Filesize

      180KB

    • memory/1964-73-0x0000000002020000-0x0000000002323000-memory.dmp
      Filesize

      3.0MB

    • memory/1964-74-0x0000000001E90000-0x0000000001F23000-memory.dmp
      Filesize

      588KB

    • memory/1964-68-0x0000000000000000-mapping.dmp