Analysis

  • max time kernel
    145s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    20-06-2022 14:02

General

  • Target

    Ziraat Bankasi Swift Mesaji.exe

  • Size

    469KB

  • MD5

    25c2ebbd0e8c30072c147d523f0162f2

  • SHA1

    d0ceb65655fc301e34c7750d1cb44908ae4a18ae

  • SHA256

    859aada0cf09832daace8902102e39989f7eac7e3152006ea017a9f27e22b162

  • SHA512

    2984620b54c2b541c378ae34572d73ee19943dee1d3ab8095c047f432f18b4e0a6715503e9108d838c72f9fc7f20712b4e3450f51dc01f3a5aad9552098967e0

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pr28

Decoy

warehouseufohighbay.com

kingasia77.xyz

americanoutfittes.com

jemodaevangica.com

holigantv82.com

creamkidslife.com

skillzplanetoutreach.com

goldencityofficial.com

choiceaccessorise.com

kdgkzy.com

patra.tech

chicaglo.com

9491countyroad106.com

theultracleanser.com

lesmacarons.biz

kfaluminum.com

institutodiversidade.com

woodanqnmz.store

teslabuyerusa.com

cityofbastop.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe
      "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1100
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1076
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1060
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:240

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/240-72-0x0000000000000000-mapping.dmp
    • memory/1060-67-0x0000000000000000-mapping.dmp
    • memory/1060-75-0x00000000000D0000-0x00000000000FF000-memory.dmp
      Filesize

      188KB

    • memory/1060-73-0x00000000006B0000-0x0000000000744000-memory.dmp
      Filesize

      592KB

    • memory/1060-71-0x0000000002150000-0x0000000002453000-memory.dmp
      Filesize

      3.0MB

    • memory/1060-70-0x00000000000D0000-0x00000000000FF000-memory.dmp
      Filesize

      188KB

    • memory/1060-69-0x00000000009F0000-0x00000000009FE000-memory.dmp
      Filesize

      56KB

    • memory/1076-59-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1076-65-0x00000000001B0000-0x00000000001C5000-memory.dmp
      Filesize

      84KB

    • memory/1076-64-0x00000000024C0000-0x00000000027C3000-memory.dmp
      Filesize

      3.0MB

    • memory/1076-63-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1076-60-0x000000000041F1C0-mapping.dmp
    • memory/1076-57-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1076-56-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1100-54-0x0000000000050000-0x00000000000CC000-memory.dmp
      Filesize

      496KB

    • memory/1100-55-0x0000000074B51000-0x0000000074B53000-memory.dmp
      Filesize

      8KB

    • memory/1400-66-0x0000000003BF0000-0x0000000003CA5000-memory.dmp
      Filesize

      724KB

    • memory/1400-74-0x0000000006070000-0x000000000619D000-memory.dmp
      Filesize

      1.2MB

    • memory/1400-76-0x0000000006070000-0x000000000619D000-memory.dmp
      Filesize

      1.2MB