Analysis

  • max time kernel
    144s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    31-05-2022 12:55

General

  • Target

    Lista e re e porosive.exe

  • Size

    890KB

  • MD5

    6bfcb98a57d68b52e693bd06a1bc583f

  • SHA1

    289985e90c08cbcf501e08eb4a2d3e14cdc59953

  • SHA256

    9e300b13abe47bb342b029714e764c39ec00ba312ad0b1479196a8e7bf41165b

  • SHA512

    4acc4047337895450d68d2cf0fcd4891d996dd57f88c7ba2608d8d394a6ddf6e379a7500cbad8158a996f2753e4e77dc0cbac7489e31a964d86cfd31b807d356

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

videohm.com

panache-rose.com

alnooncars-kw.com

trueblue2u.com

brussels-cafe.com

ip2c.net

influenzerr.com

rbcoq.com

zzful.com

drainthe.com

sumaholesson.com

cursosaprovados.com

genotecinc.com

dbrulhart.com

theapiarystudios.com

kensyu-kan.com

dkku88.com

tikhyper.com

aztecnort.com

homebrim.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 6 IoCs
  • ModiLoader Second Stage 38 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 33 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 38 IoCs
  • Suspicious use of SendNotifyMessage 36 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\Lista e re e porosive.exe
      "C:\Users\Admin\AppData\Local\Temp\Lista e re e porosive.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1468
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1120
    • C:\Windows\explorer.exe
      "C:\Windows\explorer.exe"
      2⤵
        PID:1792
      • C:\Windows\system32\taskmgr.exe
        "C:\Windows\system32\taskmgr.exe" /4
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        PID:536
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:1720
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:672
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:1560
            • C:\Windows\SysWOW64\autochk.exe
              "C:\Windows\SysWOW64\autochk.exe"
              2⤵
                PID:1652
              • C:\Windows\SysWOW64\autochk.exe
                "C:\Windows\SysWOW64\autochk.exe"
                2⤵
                  PID:1164
                • C:\Windows\SysWOW64\autochk.exe
                  "C:\Windows\SysWOW64\autochk.exe"
                  2⤵
                    PID:1488
                  • C:\Windows\SysWOW64\autochk.exe
                    "C:\Windows\SysWOW64\autochk.exe"
                    2⤵
                      PID:384
                    • C:\Windows\SysWOW64\NETSTAT.EXE
                      "C:\Windows\SysWOW64\NETSTAT.EXE"
                      2⤵
                      • Suspicious use of SetThreadContext
                      • Gathers network information
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious behavior: MapViewOfSection
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:1684
                      • C:\Windows\SysWOW64\cmd.exe
                        /c del "C:\Windows\SysWOW64\DpiScaling.exe"
                        3⤵
                          PID:1620
                    • C:\Windows\system32\AUDIODG.EXE
                      C:\Windows\system32\AUDIODG.EXE 0xc4
                      1⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:560

                    Network

                    MITRE ATT&CK Matrix ATT&CK v6

                    Execution

                    Command-Line Interface

                    1
                    T1059

                    Persistence

                    Registry Run Keys / Startup Folder

                    1
                    T1060

                    Defense Evasion

                    Modify Registry

                    1
                    T1112

                    Discovery

                    System Information Discovery

                    1
                    T1082

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/536-58-0x0000000140000000-0x00000001405E8000-memory.dmp
                      Filesize

                      5.9MB

                    • memory/1120-121-0x0000000001FC0000-0x00000000022C3000-memory.dmp
                      Filesize

                      3.0MB

                    • memory/1120-98-0x0000000000000000-mapping.dmp
                    • memory/1120-128-0x0000000010410000-0x000000001043E000-memory.dmp
                      Filesize

                      184KB

                    • memory/1120-96-0x0000000010410000-0x000000001043E000-memory.dmp
                      Filesize

                      184KB

                    • memory/1120-125-0x0000000000260000-0x0000000000274000-memory.dmp
                      Filesize

                      80KB

                    • memory/1120-122-0x0000000000220000-0x0000000000234000-memory.dmp
                      Filesize

                      80KB

                    • memory/1120-120-0x0000000010410000-0x000000001043E000-memory.dmp
                      Filesize

                      184KB

                    • memory/1396-136-0x00000000070A0000-0x000000000715D000-memory.dmp
                      Filesize

                      756KB

                    • memory/1396-135-0x00000000070A0000-0x000000000715D000-memory.dmp
                      Filesize

                      756KB

                    • memory/1396-126-0x0000000007E60000-0x0000000007F68000-memory.dmp
                      Filesize

                      1.0MB

                    • memory/1396-123-0x0000000008070000-0x0000000008204000-memory.dmp
                      Filesize

                      1.6MB

                    • memory/1468-74-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-103-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-76-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-81-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-80-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-85-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-86-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-84-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-83-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-82-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-87-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-88-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-89-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-90-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-79-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-95-0x0000000010410000-0x000000001043E000-memory.dmp
                      Filesize

                      184KB

                    • memory/1468-92-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-93-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-68-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-91-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-99-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-101-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-102-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-77-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-113-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-118-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-117-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-116-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-115-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-112-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-111-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-104-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-78-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-54-0x0000000075371000-0x0000000075373000-memory.dmp
                      Filesize

                      8KB

                    • memory/1468-72-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-73-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-75-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-71-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-69-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1468-70-0x0000000004960000-0x00000000049B4000-memory.dmp
                      Filesize

                      336KB

                    • memory/1620-129-0x0000000000000000-mapping.dmp
                    • memory/1684-130-0x0000000000860000-0x0000000000869000-memory.dmp
                      Filesize

                      36KB

                    • memory/1684-131-0x0000000000080000-0x00000000000AE000-memory.dmp
                      Filesize

                      184KB

                    • memory/1684-132-0x00000000020D0000-0x00000000023D3000-memory.dmp
                      Filesize

                      3.0MB

                    • memory/1684-133-0x0000000001F40000-0x0000000001FD3000-memory.dmp
                      Filesize

                      588KB

                    • memory/1684-134-0x0000000000080000-0x00000000000AE000-memory.dmp
                      Filesize

                      184KB

                    • memory/1684-127-0x0000000000000000-mapping.dmp
                    • memory/1792-56-0x000007FEFB551000-0x000007FEFB553000-memory.dmp
                      Filesize

                      8KB