Analysis

  • max time kernel
    148s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    21-05-2022 18:56

General

  • Target

    Total GP Employment Offer.exe

  • Size

    310KB

  • MD5

    04c8a35797fa8d2e1e3ed5f65f128d04

  • SHA1

    9736f277710815dafe27857805e0c7af97adfaeb

  • SHA256

    adf4b8a00eec7af49d20ac1939ca9b5c078e8d119c7e6f1b708c5e39df3acf71

  • SHA512

    1e0476cde888f0bec1da340809397a1582a35e2f569b9a4ba6b397b885c3ddd481deec840f245dbcb55b1d2650afcb5716779249c4d4d934afda0ace0088a47b

Malware Config

Extracted

Family

formbook

Version

4.0

Campaign

lgm

Decoy

somethingspecial.net

brickmachineequipment.com

asapprintingsales.com

wbmason.jobs

acu.ink

santandier.com

theboxofficemovies.com

tv16507.info

richardzacur.com

eurosevi.com

reformasydecoracionesrian.com

1x1zeroautumn.men

peipw.com

wurzburg.city

kidstoyscheap.com

star-pump.com

mimarsinanresidence.com

indoorgolfschool.com

livinitwithlou.net

cailiaowenda.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 4 IoCs
  • ReZer0 packer 1 IoCs

    Detects ReZer0, a packer with multiple versions used in various campaigns.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\Total GP Employment Offer.exe
      "C:\Users\Admin\AppData\Local\Temp\Total GP Employment Offer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:884
      • C:\Users\Admin\AppData\Local\Temp\Total GP Employment Offer.exe
        "{path}"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1984
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1620
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Total GP Employment Offer.exe"
        3⤵
        • Deletes itself
        PID:1612

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/884-55-0x0000000075741000-0x0000000075743000-memory.dmp
    Filesize

    8KB

  • memory/884-56-0x00000000002F0000-0x0000000000300000-memory.dmp
    Filesize

    64KB

  • memory/884-57-0x0000000004910000-0x000000000494A000-memory.dmp
    Filesize

    232KB

  • memory/884-54-0x00000000013D0000-0x0000000001424000-memory.dmp
    Filesize

    336KB

  • memory/1376-74-0x0000000004070000-0x0000000004118000-memory.dmp
    Filesize

    672KB

  • memory/1376-67-0x00000000062F0000-0x000000000643C000-memory.dmp
    Filesize

    1.3MB

  • memory/1612-72-0x0000000000000000-mapping.dmp
  • memory/1620-68-0x0000000000000000-mapping.dmp
  • memory/1620-73-0x0000000000A50000-0x0000000000AE3000-memory.dmp
    Filesize

    588KB

  • memory/1620-71-0x0000000002200000-0x0000000002503000-memory.dmp
    Filesize

    3.0MB

  • memory/1620-69-0x0000000000DE0000-0x0000000000DFB000-memory.dmp
    Filesize

    108KB

  • memory/1620-70-0x0000000000080000-0x00000000000AD000-memory.dmp
    Filesize

    180KB

  • memory/1984-58-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/1984-66-0x00000000001D0000-0x00000000001E4000-memory.dmp
    Filesize

    80KB

  • memory/1984-64-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/1984-65-0x0000000000950000-0x0000000000C53000-memory.dmp
    Filesize

    3.0MB

  • memory/1984-62-0x000000000041E350-mapping.dmp
  • memory/1984-61-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB

  • memory/1984-59-0x0000000000400000-0x000000000042D000-memory.dmp
    Filesize

    180KB