Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-07-2022 13:58

General

  • Target

    Qfrmegh.exe

  • Size

    168KB

  • MD5

    dfb8e69404268f25876c462adc10479a

  • SHA1

    a5c7ab73c4bf71c64c0bb1f3345516ca14d5d13e

  • SHA256

    bf3f26dfdfa937db7f856c20013d77ff05c76cb6f359b703d3f25e840686a9a4

  • SHA512

    2f9381e0d336e97c767aff166928c5ee6d6a26940c7131ed5753aa0702d377d0d8abfceaa80271498120cefd609c10026ec2bd5bf87dc1fdab2e9bbaacf9e527

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ba17

Decoy

bearwant.com

sdsguanfang.com

steamcommunityvia.top

sugarplumtreasures.com

koronislakefishing.com

jmae.xyz

xhxnqemkiqe.xyz

playzcrew.com

zatwsbq.com

lankofix.com

sh-zhepeng.com

mibodamisxv.online

butterflyjewelry.store

finestrecitalto-spottoday.info

globomateria.com

royalmdarts.com

d4af10836709.com

shepwill.com

67aldrich.info

trustedmakers.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 54 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Users\Admin\AppData\Local\Temp\Qfrmegh.exe
      "C:\Users\Admin\AppData\Local\Temp\Qfrmegh.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:728
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgAwAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1892
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3512
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:240
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:2520

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/240-150-0x0000000000610000-0x0000000000627000-memory.dmp
      Filesize

      92KB

    • memory/240-152-0x0000000000720000-0x000000000074F000-memory.dmp
      Filesize

      188KB

    • memory/240-147-0x0000000000000000-mapping.dmp
    • memory/240-151-0x0000000000FD0000-0x000000000131A000-memory.dmp
      Filesize

      3.3MB

    • memory/240-153-0x0000000000E70000-0x0000000000F04000-memory.dmp
      Filesize

      592KB

    • memory/240-154-0x0000000000720000-0x000000000074F000-memory.dmp
      Filesize

      188KB

    • memory/728-140-0x0000000005E30000-0x0000000005EC2000-memory.dmp
      Filesize

      584KB

    • memory/728-130-0x0000000000740000-0x0000000000770000-memory.dmp
      Filesize

      192KB

    • memory/1892-135-0x0000000006090000-0x00000000060F6000-memory.dmp
      Filesize

      408KB

    • memory/1892-139-0x0000000006C40000-0x0000000006C5A000-memory.dmp
      Filesize

      104KB

    • memory/1892-138-0x0000000007F90000-0x000000000860A000-memory.dmp
      Filesize

      6.5MB

    • memory/1892-137-0x0000000006740000-0x000000000675E000-memory.dmp
      Filesize

      120KB

    • memory/1892-136-0x0000000006100000-0x0000000006166000-memory.dmp
      Filesize

      408KB

    • memory/1892-134-0x0000000005780000-0x00000000057A2000-memory.dmp
      Filesize

      136KB

    • memory/1892-133-0x0000000005960000-0x0000000005F88000-memory.dmp
      Filesize

      6.2MB

    • memory/1892-132-0x0000000003190000-0x00000000031C6000-memory.dmp
      Filesize

      216KB

    • memory/1892-131-0x0000000000000000-mapping.dmp
    • memory/2240-156-0x00000000087F0000-0x000000000891A000-memory.dmp
      Filesize

      1.2MB

    • memory/2240-155-0x00000000087F0000-0x000000000891A000-memory.dmp
      Filesize

      1.2MB

    • memory/2240-146-0x00000000081E0000-0x0000000008355000-memory.dmp
      Filesize

      1.5MB

    • memory/2520-149-0x0000000000000000-mapping.dmp
    • memory/3512-148-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/3512-145-0x0000000001980000-0x0000000001995000-memory.dmp
      Filesize

      84KB

    • memory/3512-144-0x00000000019D0000-0x0000000001D1A000-memory.dmp
      Filesize

      3.3MB

    • memory/3512-142-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/3512-141-0x0000000000000000-mapping.dmp