Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    27-05-2022 17:09

General

  • Target

    05ab9004968d1a9d4187dac4e629ef8ea777fb66c4d009ad411f2f945f2a53f0.exe

  • Size

    463KB

  • MD5

    9841dbf9dfa221a4e050db3e92689bc9

  • SHA1

    6948e9499fc0bfa41a72107b1fc58b15a9e40f63

  • SHA256

    05ab9004968d1a9d4187dac4e629ef8ea777fb66c4d009ad411f2f945f2a53f0

  • SHA512

    c1791b418fbc55d00006f01a9b1dfba21dfed3fc4bb5b25f05a55c02e4c3af435a284979f186ec095bfc4e1d2717c0686d2e9b7a938be6ecf567cfd3e1517298

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

h35

Decoy

maraudersinc.com

liebianwangluo.com

visit-australia.info

machiyane-kasukabe.com

hafizclub.com

merkburn.net

favoritetraffic2updating.win

adrian-oeser.net

nkshopdomaincpplt234.info

imperiodofutebol.com

welometocaloundra.com

thehealthypose.com

squalloptna.com

bobknowsbest.com

damgproperties.com

wastemastershire.co.uk

swacballet.com

japanbreakingnews.com

bjufaa.info

aryakuza.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook Payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3056
    • C:\Users\Admin\AppData\Local\Temp\05ab9004968d1a9d4187dac4e629ef8ea777fb66c4d009ad411f2f945f2a53f0.exe
      "C:\Users\Admin\AppData\Local\Temp\05ab9004968d1a9d4187dac4e629ef8ea777fb66c4d009ad411f2f945f2a53f0.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3536
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4880
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2452
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:340

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/340-146-0x0000000000000000-mapping.dmp
    • memory/2452-141-0x0000000000000000-mapping.dmp
    • memory/2452-143-0x0000000000530000-0x0000000000546000-memory.dmp
      Filesize

      88KB

    • memory/2452-149-0x0000000000A40000-0x0000000000A6A000-memory.dmp
      Filesize

      168KB

    • memory/2452-147-0x0000000002760000-0x00000000027F3000-memory.dmp
      Filesize

      588KB

    • memory/2452-145-0x00000000028D0000-0x0000000002C1A000-memory.dmp
      Filesize

      3.3MB

    • memory/2452-144-0x0000000000A40000-0x0000000000A6A000-memory.dmp
      Filesize

      168KB

    • memory/3056-150-0x0000000008420000-0x0000000008556000-memory.dmp
      Filesize

      1.2MB

    • memory/3056-148-0x0000000008420000-0x0000000008556000-memory.dmp
      Filesize

      1.2MB

    • memory/3056-140-0x00000000035B0000-0x0000000003689000-memory.dmp
      Filesize

      868KB

    • memory/3536-133-0x00000000058C0000-0x00000000058CA000-memory.dmp
      Filesize

      40KB

    • memory/3536-132-0x0000000005940000-0x00000000059D2000-memory.dmp
      Filesize

      584KB

    • memory/3536-131-0x0000000005E50000-0x00000000063F4000-memory.dmp
      Filesize

      5.6MB

    • memory/3536-134-0x0000000006CE0000-0x0000000006D7C000-memory.dmp
      Filesize

      624KB

    • memory/3536-130-0x0000000000EB0000-0x0000000000F2A000-memory.dmp
      Filesize

      488KB

    • memory/4880-139-0x0000000000AC0000-0x0000000000AD4000-memory.dmp
      Filesize

      80KB

    • memory/4880-137-0x0000000002790000-0x0000000002ADA000-memory.dmp
      Filesize

      3.3MB

    • memory/4880-142-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/4880-136-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/4880-135-0x0000000000000000-mapping.dmp