Analysis

  • max time kernel
    147s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    11-06-2022 12:30

General

  • Target

    Ziraat Bankasi Swift Mesaji.exe

  • Size

    690KB

  • MD5

    ad8c1fb6847c90cec8545d5a1d12e098

  • SHA1

    75587c6e26bb845a03b2c17526f85561e2664c10

  • SHA256

    32b7d0b30638db08927b43bb633cb29da62ab634c34de42ff582841191c31839

  • SHA512

    8b867ca4f8d538aef19b2707195aa0b6e83bb42b54ab035d00e52bdb6881e378a55580431b38ea60d5e87462656b2662bab56e42e2b22dd2a15a33f15d18152d

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pr28

Decoy

warehouseufohighbay.com

kingasia77.xyz

americanoutfittes.com

jemodaevangica.com

holigantv82.com

creamkidslife.com

skillzplanetoutreach.com

goldencityofficial.com

choiceaccessorise.com

kdgkzy.com

patra.tech

chicaglo.com

9491countyroad106.com

theultracleanser.com

lesmacarons.biz

kfaluminum.com

institutodiversidade.com

woodanqnmz.store

teslabuyerusa.com

cityofbastop.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 5 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 17 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe
      "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe
        "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1588
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1584
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
        3⤵
        • Deletes itself
        PID:1296

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1256-68-0x0000000004A90000-0x0000000004B99000-memory.dmp
    Filesize

    1.0MB

  • memory/1256-78-0x0000000004BA0000-0x0000000004CE0000-memory.dmp
    Filesize

    1.2MB

  • memory/1256-76-0x0000000004BA0000-0x0000000004CE0000-memory.dmp
    Filesize

    1.2MB

  • memory/1296-71-0x0000000000000000-mapping.dmp
  • memory/1584-77-0x0000000000070000-0x000000000009F000-memory.dmp
    Filesize

    188KB

  • memory/1584-75-0x0000000000510000-0x00000000005A4000-memory.dmp
    Filesize

    592KB

  • memory/1584-74-0x0000000000070000-0x000000000009F000-memory.dmp
    Filesize

    188KB

  • memory/1584-73-0x0000000002110000-0x0000000002413000-memory.dmp
    Filesize

    3.0MB

  • memory/1584-72-0x0000000000CE0000-0x0000000000D06000-memory.dmp
    Filesize

    152KB

  • memory/1584-69-0x0000000000000000-mapping.dmp
  • memory/1588-66-0x0000000000820000-0x0000000000B23000-memory.dmp
    Filesize

    3.0MB

  • memory/1588-67-0x0000000000180000-0x0000000000195000-memory.dmp
    Filesize

    84KB

  • memory/1588-64-0x000000000041F1C0-mapping.dmp
  • memory/1588-70-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1588-63-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1588-61-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1588-60-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1992-54-0x0000000000D20000-0x0000000000DD2000-memory.dmp
    Filesize

    712KB

  • memory/1992-59-0x00000000042B0000-0x00000000042E4000-memory.dmp
    Filesize

    208KB

  • memory/1992-58-0x0000000000C60000-0x0000000000C66000-memory.dmp
    Filesize

    24KB

  • memory/1992-57-0x0000000008210000-0x00000000082A2000-memory.dmp
    Filesize

    584KB

  • memory/1992-56-0x0000000000710000-0x0000000000722000-memory.dmp
    Filesize

    72KB

  • memory/1992-55-0x00000000751C1000-0x00000000751C3000-memory.dmp
    Filesize

    8KB