Analysis

  • max time kernel
    597s
  • max time network
    596s
  • platform
    windows7_x64
  • resource
    win7-20220414-es
  • submitted
    31-05-2022 18:23

General

  • Target

    factura de pago adjunta.exe

  • Size

    890KB

  • MD5

    6bfcb98a57d68b52e693bd06a1bc583f

  • SHA1

    289985e90c08cbcf501e08eb4a2d3e14cdc59953

  • SHA256

    9e300b13abe47bb342b029714e764c39ec00ba312ad0b1479196a8e7bf41165b

  • SHA512

    4acc4047337895450d68d2cf0fcd4891d996dd57f88c7ba2608d8d394a6ddf6e379a7500cbad8158a996f2753e4e77dc0cbac7489e31a964d86cfd31b807d356

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

videohm.com

panache-rose.com

alnooncars-kw.com

trueblue2u.com

brussels-cafe.com

ip2c.net

influenzerr.com

rbcoq.com

zzful.com

drainthe.com

sumaholesson.com

cursosaprovados.com

genotecinc.com

dbrulhart.com

theapiarystudios.com

kensyu-kan.com

dkku88.com

tikhyper.com

aztecnort.com

homebrim.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 5 IoCs
  • ModiLoader Second Stage 38 IoCs
  • Blocklisted process makes network request 2 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1392
    • C:\Users\Admin\AppData\Local\Temp\factura de pago adjunta.exe
      "C:\Users\Admin\AppData\Local\Temp\factura de pago adjunta.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1056
      • C:\Windows\SysWOW64\DpiScaling.exe
        C:\Windows\System32\DpiScaling.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1800
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:1308
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:552
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:1708
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:360
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:824
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:2044
                • C:\Windows\SysWOW64\cmstp.exe
                  "C:\Windows\SysWOW64\cmstp.exe"
                  2⤵
                  • Blocklisted process makes network request
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious behavior: MapViewOfSection
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:616
                  • C:\Windows\SysWOW64\cmd.exe
                    /c del "C:\Windows\SysWOW64\DpiScaling.exe"
                    3⤵
                      PID:1516

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Defense Evasion

                Modify Registry

                1
                T1112

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/616-121-0x0000000000000000-mapping.dmp
                • memory/616-129-0x00000000000D0000-0x00000000000FE000-memory.dmp
                  Filesize

                  184KB

                • memory/616-127-0x00000000008B0000-0x0000000000943000-memory.dmp
                  Filesize

                  588KB

                • memory/616-126-0x0000000002090000-0x0000000002393000-memory.dmp
                  Filesize

                  3.0MB

                • memory/616-125-0x00000000000D0000-0x00000000000FE000-memory.dmp
                  Filesize

                  184KB

                • memory/616-124-0x0000000000AE0000-0x0000000000AF8000-memory.dmp
                  Filesize

                  96KB

                • memory/1056-89-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-99-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-70-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-69-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-75-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-76-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-74-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-73-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-80-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-81-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-79-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-78-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-77-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-84-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-83-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-82-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-85-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-87-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-86-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-90-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-71-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-88-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-92-0x0000000010410000-0x000000001043E000-memory.dmp
                  Filesize

                  184KB

                • memory/1056-96-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-98-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-72-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-100-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-101-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-108-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-109-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-110-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-112-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-113-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-114-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-115-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-54-0x00000000759D1000-0x00000000759D3000-memory.dmp
                  Filesize

                  8KB

                • memory/1056-65-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-66-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-67-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1056-68-0x0000000004980000-0x00000000049D4000-memory.dmp
                  Filesize

                  336KB

                • memory/1392-128-0x0000000006F90000-0x00000000070FE000-memory.dmp
                  Filesize

                  1.4MB

                • memory/1392-120-0x00000000050C0000-0x00000000051B6000-memory.dmp
                  Filesize

                  984KB

                • memory/1392-130-0x0000000006F90000-0x00000000070FE000-memory.dmp
                  Filesize

                  1.4MB

                • memory/1516-123-0x0000000000000000-mapping.dmp
                • memory/1800-95-0x0000000000000000-mapping.dmp
                • memory/1800-93-0x0000000010410000-0x000000001043E000-memory.dmp
                  Filesize

                  184KB

                • memory/1800-117-0x0000000010410000-0x000000001043E000-memory.dmp
                  Filesize

                  184KB

                • memory/1800-118-0x0000000002070000-0x0000000002373000-memory.dmp
                  Filesize

                  3.0MB

                • memory/1800-119-0x0000000000220000-0x0000000000234000-memory.dmp
                  Filesize

                  80KB