Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 01:19

General

  • Target

    56e8e3a2d3330298f144767f1ef320fc3ecd1a968d47e8308486018dc224ea00.exe

  • Size

    624KB

  • MD5

    0c67efeca56fee9e1978a87161db87ad

  • SHA1

    e54fa09cd9d897b8490de36033488c8c99687f82

  • SHA256

    56e8e3a2d3330298f144767f1ef320fc3ecd1a968d47e8308486018dc224ea00

  • SHA512

    3fb9dee3f078c28d8cf5f288a26e136b6a3f7664bec2b33d1f6835c367511a1e0cb1830318461d5003182c7fee3b3c5f64e54769db2d3c4b4fef591e5b3d3a95

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

et

Decoy

filmeedt06.com

getbrave.net

tdshome.com

audioteck.net

eplogovi.com

verywedding.net

biqiba.com

learnandunderstand.science

jsgxcxae.com

9aop4k.link

laceycphotography.com

ldbberendsenreading.com

life365coaching.com

ambercampbell.photography

activeliberal.win

tupelocounseling.com

finovice.com

fantatressette.com

sojah.store

qhdljj.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook payload 5 IoCs
  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\56e8e3a2d3330298f144767f1ef320fc3ecd1a968d47e8308486018dc224ea00.exe
      "C:\Users\Admin\AppData\Local\Temp\56e8e3a2d3330298f144767f1ef320fc3ecd1a968d47e8308486018dc224ea00.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\subfolder\config.vbs"
        3⤵
        • Loads dropped DLL
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1684
        • C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe
          "C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe"
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1376
          • C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe
            "C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:880
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • System policy modification
      PID:1888
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe"
        3⤵
          PID:1160

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    2
    T1060

    Defense Evasion

    Modify Registry

    4
    T1112

    Credential Access

    Credentials in Files

    1
    T1081

    Discovery

    System Information Discovery

    1
    T1082

    Collection

    Data from Local System

    1
    T1005

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe
      Filesize

      624KB

      MD5

      39e146c21950f1598f54cf2c152309ea

      SHA1

      c0b6c050572bac9dba3ef45c843dc0bee70bb93f

      SHA256

      86dfa508439c99e32e01cb036b3cbbd9b559f1ffd7d2ac91409dd1275343f129

      SHA512

      ecdd6f5c8f39f89a9a361e4d9d42c20b0a67128993273e875fd97333429964918fb32b1b1ff8f191274c00ad961b00c9e5ecd0335275cb8432eeb59068513d4a

    • C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe
      Filesize

      624KB

      MD5

      39e146c21950f1598f54cf2c152309ea

      SHA1

      c0b6c050572bac9dba3ef45c843dc0bee70bb93f

      SHA256

      86dfa508439c99e32e01cb036b3cbbd9b559f1ffd7d2ac91409dd1275343f129

      SHA512

      ecdd6f5c8f39f89a9a361e4d9d42c20b0a67128993273e875fd97333429964918fb32b1b1ff8f191274c00ad961b00c9e5ecd0335275cb8432eeb59068513d4a

    • C:\Users\Admin\AppData\Local\Temp\subfolder\config.exe
      Filesize

      624KB

      MD5

      39e146c21950f1598f54cf2c152309ea

      SHA1

      c0b6c050572bac9dba3ef45c843dc0bee70bb93f

      SHA256

      86dfa508439c99e32e01cb036b3cbbd9b559f1ffd7d2ac91409dd1275343f129

      SHA512

      ecdd6f5c8f39f89a9a361e4d9d42c20b0a67128993273e875fd97333429964918fb32b1b1ff8f191274c00ad961b00c9e5ecd0335275cb8432eeb59068513d4a

    • C:\Users\Admin\AppData\Local\Temp\subfolder\config.vbs
      Filesize

      1024B

      MD5

      5bdea36f4c939ee55c2f04f28daea1b6

      SHA1

      c0ad92ace1a31063baa30b32955a084158310bc3

      SHA256

      bb1e99fbe3c101fbef7302ac5bc41177ef868c74c2047820d832fa7b151ced11

      SHA512

      051ee3ad63039b91fb62c7d229b2b564da3c87df678ae900ab01199798aa1ab1df2629c0a61c25736fdd9f5f24fde9fe1fb97691a87c341e01b3c8497419dbf4

    • C:\Users\Admin\AppData\Roaming\56O9743E\56Ologim.jpeg
      Filesize

      72KB

      MD5

      e743a2ace423aa9a89a07fef68591bf5

      SHA1

      d7460b03df152f1348082f3961ab69db879ab17e

      SHA256

      242fa234a24204db37704137f3ba199187a647eb6cac1fd9ddfdbc3414e400e0

      SHA512

      1dfc4f256fc26c505bdb4c7169e2253311c583001c0e361aae4b6ae910f48cb932a1ba5ef696eee3dea88e775faf629f7ec2a1ef03f1fd0c2129f5e0d0e3423c

    • C:\Users\Admin\AppData\Roaming\56O9743E\56Ologri.ini
      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\56O9743E\56Ologrv.ini
      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • \Users\Admin\AppData\Local\Temp\subfolder\config.exe
      Filesize

      624KB

      MD5

      39e146c21950f1598f54cf2c152309ea

      SHA1

      c0b6c050572bac9dba3ef45c843dc0bee70bb93f

      SHA256

      86dfa508439c99e32e01cb036b3cbbd9b559f1ffd7d2ac91409dd1275343f129

      SHA512

      ecdd6f5c8f39f89a9a361e4d9d42c20b0a67128993273e875fd97333429964918fb32b1b1ff8f191274c00ad961b00c9e5ecd0335275cb8432eeb59068513d4a

    • \Users\Admin\AppData\Local\Temp\subfolder\config.exe
      Filesize

      624KB

      MD5

      39e146c21950f1598f54cf2c152309ea

      SHA1

      c0b6c050572bac9dba3ef45c843dc0bee70bb93f

      SHA256

      86dfa508439c99e32e01cb036b3cbbd9b559f1ffd7d2ac91409dd1275343f129

      SHA512

      ecdd6f5c8f39f89a9a361e4d9d42c20b0a67128993273e875fd97333429964918fb32b1b1ff8f191274c00ad961b00c9e5ecd0335275cb8432eeb59068513d4a

    • \Users\Admin\AppData\Local\Temp\subfolder\config.exe
      Filesize

      624KB

      MD5

      39e146c21950f1598f54cf2c152309ea

      SHA1

      c0b6c050572bac9dba3ef45c843dc0bee70bb93f

      SHA256

      86dfa508439c99e32e01cb036b3cbbd9b559f1ffd7d2ac91409dd1275343f129

      SHA512

      ecdd6f5c8f39f89a9a361e4d9d42c20b0a67128993273e875fd97333429964918fb32b1b1ff8f191274c00ad961b00c9e5ecd0335275cb8432eeb59068513d4a

    • memory/880-71-0x000000000041B4C0-mapping.dmp
    • memory/880-70-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/880-74-0x0000000000900000-0x0000000000C03000-memory.dmp
      Filesize

      3.0MB

    • memory/880-75-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/880-76-0x0000000000350000-0x0000000000364000-memory.dmp
      Filesize

      80KB

    • memory/1160-79-0x0000000000000000-mapping.dmp
    • memory/1260-84-0x00000000068E0000-0x00000000069FA000-memory.dmp
      Filesize

      1.1MB

    • memory/1260-77-0x0000000006A80000-0x0000000006C1D000-memory.dmp
      Filesize

      1.6MB

    • memory/1260-86-0x00000000068E0000-0x00000000069FA000-memory.dmp
      Filesize

      1.1MB

    • memory/1376-64-0x0000000000000000-mapping.dmp
    • memory/1684-58-0x0000000000000000-mapping.dmp
    • memory/1888-81-0x0000000000070000-0x000000000009A000-memory.dmp
      Filesize

      168KB

    • memory/1888-82-0x00000000020A0000-0x00000000023A3000-memory.dmp
      Filesize

      3.0MB

    • memory/1888-83-0x0000000001F70000-0x0000000002003000-memory.dmp
      Filesize

      588KB

    • memory/1888-80-0x00000000009A0000-0x00000000009C2000-memory.dmp
      Filesize

      136KB

    • memory/1888-85-0x0000000000070000-0x000000000009A000-memory.dmp
      Filesize

      168KB

    • memory/1888-78-0x0000000000000000-mapping.dmp
    • memory/2032-56-0x0000000000240000-0x0000000000246000-memory.dmp
      Filesize

      24KB

    • memory/2032-57-0x0000000075C51000-0x0000000075C53000-memory.dmp
      Filesize

      8KB