Analysis

  • max time kernel
    147s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-07-2022 07:33

General

  • Target

    2feb4df65e22132bda72311108f6da24.exe

  • Size

    770KB

  • MD5

    2feb4df65e22132bda72311108f6da24

  • SHA1

    8a165756d84094a9ac840f83fd7370f158b233c2

  • SHA256

    141d09dc3b6f2084a35fbc63ea487e6786c91975ad7868caacbed9ecfa685a6b

  • SHA512

    6a3b4e006fa1c411db2eab4f8ebd0f8aefc3b721c545a182e771d656a9b88e6af48d98d632f755c22f4d2bf97be4bfa57359635c226ecdc445b9390cadb61a10

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

t3c9

Decoy

waidfu.com

sjglyshsv.com

sdztgy.com

health-magazines.info

bajoarmadura.com

oxian.xyz

jonspearman.com

fusodu.online

jx1718.net

arminva6tinderella.xyz

susuhiwah.com

novotherm.online

superbloomerz.com

kuaida56.com

74hc86.com

stellumml.com

neurocalibration.com

pinkspirit.store

solitaipat.com

eassiy.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 5 IoCs
  • ModiLoader Second Stage 39 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3132
    • C:\Users\Admin\AppData\Local\Temp\2feb4df65e22132bda72311108f6da24.exe
      "C:\Users\Admin\AppData\Local\Temp\2feb4df65e22132bda72311108f6da24.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:532
      • C:\Windows\SysWOW64\logagent.exe
        C:\Windows\System32\logagent.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4624
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:3356
      • C:\Windows\SysWOW64\msiexec.exe
        "C:\Windows\SysWOW64\msiexec.exe"
        2⤵
        • Blocklisted process makes network request
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\SysWOW64\logagent.exe"
          3⤵
            PID:4856

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/532-167-0x0000000010410000-0x000000001043F000-memory.dmp
        Filesize

        188KB

      • memory/532-159-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-140-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-143-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-145-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-144-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-146-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-147-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-149-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-148-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-150-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-151-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-152-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-154-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-153-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-156-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-155-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-157-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-158-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-141-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-160-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-161-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-162-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-163-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-164-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-165-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-142-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-169-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-170-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-171-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-172-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-173-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-180-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-181-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-182-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-183-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-184-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-186-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-185-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/532-187-0x0000000003D80000-0x0000000003DD5000-memory.dmp
        Filesize

        340KB

      • memory/3132-191-0x00000000083F0000-0x0000000008538000-memory.dmp
        Filesize

        1.3MB

      • memory/3132-199-0x0000000002A70000-0x0000000002B6A000-memory.dmp
        Filesize

        1000KB

      • memory/3132-201-0x0000000002A70000-0x0000000002B6A000-memory.dmp
        Filesize

        1000KB

      • memory/4624-168-0x0000000000000000-mapping.dmp
      • memory/4624-189-0x0000000002940000-0x0000000002C8A000-memory.dmp
        Filesize

        3.3MB

      • memory/4624-190-0x0000000002850000-0x0000000002865000-memory.dmp
        Filesize

        84KB

      • memory/4624-193-0x0000000010410000-0x000000001043F000-memory.dmp
        Filesize

        188KB

      • memory/4856-194-0x0000000000000000-mapping.dmp
      • memory/4960-192-0x0000000000000000-mapping.dmp
      • memory/4960-195-0x0000000000270000-0x0000000000282000-memory.dmp
        Filesize

        72KB

      • memory/4960-197-0x0000000002380000-0x00000000026CA000-memory.dmp
        Filesize

        3.3MB

      • memory/4960-196-0x0000000000140000-0x000000000016F000-memory.dmp
        Filesize

        188KB

      • memory/4960-198-0x0000000002120000-0x00000000021B4000-memory.dmp
        Filesize

        592KB

      • memory/4960-200-0x0000000000140000-0x000000000016F000-memory.dmp
        Filesize

        188KB