Analysis

  • max time kernel
    151s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220414-en
  • submitted
    06-07-2022 13:27

General

  • Target

    Irrazvdr.exe

  • Size

    54KB

  • MD5

    cedb27004e2fbaf88af7850aaf5133b0

  • SHA1

    1ea8386b3a52bb32ae24f41ba0ef4f912eada74c

  • SHA256

    2cbb67b48b3162ce44c224d9230d58a4263e71a50ca82673477d2e14f7ae2087

  • SHA512

    3dd1a35ab8d59db4b933190906e9d039459c8d7e39849819d6ba9ac214f57f826bf6ab3342f132971b104016779035704efb1dd5e000af1419e83a0060a79521

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ca27

Decoy

sefacoin.com

rightvisionsecuritysystems.com

jthousing1509.com

bj-sfxh.com

fansdy.com

waltit.com

kgaelhp.icu

latil.sa.com

ethmerger.com

theunimarkgroup.com

51anb.com

betsinatra.com

asd3wuh.icu

vinissimo3gwen.xyz

supernewshub.site

asfq4ev.icu

nftstoremarketing.com

blondefitgal.com

zmsoftware-co.com

beedotech.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 5 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\Irrazvdr.exe
      "C:\Users\Admin\AppData\Local\Temp\Irrazvdr.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:784
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1992
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:892
      • C:\Windows\SysWOW64\ipconfig.exe
        "C:\Windows\SysWOW64\ipconfig.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Gathers network information
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1744
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe"
          3⤵
            PID:1860

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Command-Line Interface

      1
      T1059

      Persistence

      Registry Run Keys / Startup Folder

      1
      T1060

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/784-55-0x0000000076391000-0x0000000076393000-memory.dmp
        Filesize

        8KB

      • memory/784-56-0x0000000005320000-0x00000000053C6000-memory.dmp
        Filesize

        664KB

      • memory/784-57-0x0000000004AE0000-0x0000000004B2C000-memory.dmp
        Filesize

        304KB

      • memory/784-54-0x00000000012C0000-0x00000000012D2000-memory.dmp
        Filesize

        72KB

      • memory/1396-66-0x00000000068C0000-0x0000000006A5B000-memory.dmp
        Filesize

        1.6MB

      • memory/1396-77-0x00000000070F0000-0x00000000071A0000-memory.dmp
        Filesize

        704KB

      • memory/1396-75-0x00000000070F0000-0x00000000071A0000-memory.dmp
        Filesize

        704KB

      • memory/1744-72-0x00000000000C0000-0x00000000000EF000-memory.dmp
        Filesize

        188KB

      • memory/1744-71-0x0000000000C90000-0x0000000000C9A000-memory.dmp
        Filesize

        40KB

      • memory/1744-76-0x00000000000C0000-0x00000000000EF000-memory.dmp
        Filesize

        188KB

      • memory/1744-74-0x0000000000580000-0x0000000000614000-memory.dmp
        Filesize

        592KB

      • memory/1744-67-0x0000000000000000-mapping.dmp
      • memory/1744-73-0x00000000020A0000-0x00000000023A3000-memory.dmp
        Filesize

        3.0MB

      • memory/1860-70-0x0000000000000000-mapping.dmp
      • memory/1992-63-0x0000000000890000-0x0000000000B93000-memory.dmp
        Filesize

        3.0MB

      • memory/1992-61-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1992-68-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1992-62-0x000000000041F060-mapping.dmp
      • memory/1992-59-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1992-65-0x0000000000220000-0x0000000000235000-memory.dmp
        Filesize

        84KB

      • memory/1992-58-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB