Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220414-en
  • submitted
    06-07-2022 20:00

General

  • Target

    tmp.exe

  • Size

    538KB

  • MD5

    c0138bfa58d20206600eaf1657f95f75

  • SHA1

    fa232e4df93c81093044ff552381d41ebcc5f443

  • SHA256

    79e6aa9fb18847e4c5b5e00dd742b3b00057d20bbede37f1c8740b21666b44e1

  • SHA512

    082a20109057787fdb3d8bfa5607e379c4d803d862367078e24a40018c3a6ed4fa3c09ce0c95152a169cfa98f2348c47e20af1cbf4b69dd164fcc6b9a80040bd

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bk19

Decoy

parkersuite.com

quanzhujs.com

ofourfuture.com

palazzonutraceuticals.com

xowshfv.top

casinoguide.bet

kangdurian.com

luxurymainewaterfront.com

sdjyyy.com

uglymugvs.com

lawncaregeni.com

simproful.net

upskirts-tube.com

taiylormade.com

okyxx1k4w.digital

shop-marvel.direct

tecdiario.com

click2claim.xyz

2dot2dot.space

gercektarih.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook Payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:4504
        • C:\Users\Admin\AppData\Local\Temp\tmp.exe
          "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4980
      • C:\Windows\SysWOW64\wlanext.exe
        "C:\Windows\SysWOW64\wlanext.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4964
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
          3⤵
            PID:4256

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/2300-131-0x0000000005850000-0x0000000005DF4000-memory.dmp
        Filesize

        5.6MB

      • memory/2300-132-0x0000000005340000-0x00000000053D2000-memory.dmp
        Filesize

        584KB

      • memory/2300-133-0x00000000052C0000-0x00000000052CA000-memory.dmp
        Filesize

        40KB

      • memory/2300-134-0x0000000008C90000-0x0000000008D2C000-memory.dmp
        Filesize

        624KB

      • memory/2300-130-0x0000000000890000-0x000000000091C000-memory.dmp
        Filesize

        560KB

      • memory/3144-142-0x0000000002600000-0x0000000002771000-memory.dmp
        Filesize

        1.4MB

      • memory/3144-151-0x0000000002780000-0x000000000286B000-memory.dmp
        Filesize

        940KB

      • memory/3144-150-0x0000000002780000-0x000000000286B000-memory.dmp
        Filesize

        940KB

      • memory/4256-146-0x0000000000000000-mapping.dmp
      • memory/4504-135-0x0000000000000000-mapping.dmp
      • memory/4964-143-0x0000000000000000-mapping.dmp
      • memory/4964-145-0x0000000000690000-0x00000000006BF000-memory.dmp
        Filesize

        188KB

      • memory/4964-144-0x0000000000200000-0x0000000000217000-memory.dmp
        Filesize

        92KB

      • memory/4964-147-0x0000000000D10000-0x000000000105A000-memory.dmp
        Filesize

        3.3MB

      • memory/4964-148-0x0000000000690000-0x00000000006BF000-memory.dmp
        Filesize

        188KB

      • memory/4964-149-0x0000000000C50000-0x0000000000CE3000-memory.dmp
        Filesize

        588KB

      • memory/4980-141-0x0000000001290000-0x00000000012A4000-memory.dmp
        Filesize

        80KB

      • memory/4980-140-0x00000000012F0000-0x000000000163A000-memory.dmp
        Filesize

        3.3MB

      • memory/4980-139-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/4980-137-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/4980-136-0x0000000000000000-mapping.dmp