Analysis

  • max time kernel
    151s
  • max time network
    158s
  • platform
    windows7_x64
  • resource
    win7-20220715-en
  • resource tags

    arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 05:57

General

  • Target

    files/14.exe

  • Size

    632KB

  • MD5

    cf123d2f8c6cf7a88472483607163eb5

  • SHA1

    7f15a558d3d63d689d754d3cea804b9ebb79c50b

  • SHA256

    f11ce5b6edfa6ee04b2334cb820f03fd99df64185daf857f4a241653ef2f1a64

  • SHA512

    9b9bb092d139447df86a8286dae1907f56e624e0324ec693e9f91c1b0f2e25041e3187fe44ae618b6cdf35715373ff05b5825d416fb9d858bf265b44cb26ed6d

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

di

Decoy

baoxiaofan.com

bestwaycartage.com

sag-architecture.com

salamcanteen.com

clinicalpsychologistkerala.com

mttv222.com

theweproject.com

fybbracelets.net

vv666h.com

bangfupin.com

arkprojetos.com

realgoaldigger.com

pilotedphotography.com

6zonxm55.biz

gaoduanmi.com

aminahmad.com

bountymarketing.net

christopher-rennebach.com

02xjys.faith

estilomiau.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\files\14.exe
      "C:\Users\Admin\AppData\Local\Temp\files\14.exe"
      2⤵
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:944
      • C:\Users\Admin\AppData\Local\Temp\files\14.exe
        "C:\Users\Admin\AppData\Local\Temp\files\14.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:896
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:1392
      • C:\Windows\SysWOW64\cmmon32.exe
        "C:\Windows\SysWOW64\cmmon32.exe"
        2⤵
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Drops file in Program Files directory
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1344
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\files\14.exe"
          3⤵
          • Deletes itself
          PID:1260

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\8KR3TD9E\8KRlogim.jpeg
      Filesize

      60KB

      MD5

      608808024ed25ddc11b487e65d894f7e

      SHA1

      d5e3b90040f8590424211a4ae54dbe26eca1815f

      SHA256

      6ecf8d5e99ce0e6689e27ca1880c223dde0f79ae5c7a9e43ba9545c9c3a10c2f

      SHA512

      64fb9a53da7257366fbd004798cd00615605b64050a2d571008f5d9ea1c411f237c8457ad540a296094f8c78d5e1178bdf419c4320bcb31839ccff887a26c6f7

    • C:\Users\Admin\AppData\Roaming\8KR3TD9E\8KRlogri.ini
      Filesize

      40B

      MD5

      d63a82e5d81e02e399090af26db0b9cb

      SHA1

      91d0014c8f54743bba141fd60c9d963f869d76c9

      SHA256

      eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

      SHA512

      38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

    • C:\Users\Admin\AppData\Roaming\8KR3TD9E\8KRlogrv.ini
      Filesize

      40B

      MD5

      ba3b6bc807d4f76794c4b81b09bb9ba5

      SHA1

      24cb89501f0212ff3095ecc0aba97dd563718fb1

      SHA256

      6eebf968962745b2e9de2ca969af7c424916d4e3fe3cc0bb9b3d414abfce9507

      SHA512

      ecd07e601fc9e3cfc39addd7bd6f3d7f7ff3253afb40bf536e9eaac5a4c243e5ec40fbfd7b216cb0ea29f2517419601e335e33ba19dea4a46f65e38694d465bf

    • memory/896-58-0x0000000000000000-mapping.dmp
    • memory/896-60-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/896-61-0x0000000000400000-0x000000000042A000-memory.dmp
      Filesize

      168KB

    • memory/896-62-0x0000000000880000-0x0000000000B83000-memory.dmp
      Filesize

      3.0MB

    • memory/896-63-0x00000000002C0000-0x00000000002D4000-memory.dmp
      Filesize

      80KB

    • memory/944-56-0x0000000000300000-0x0000000000306000-memory.dmp
      Filesize

      24KB

    • memory/944-57-0x0000000075241000-0x0000000075243000-memory.dmp
      Filesize

      8KB

    • memory/944-59-0x0000000000300000-0x0000000000306000-memory.dmp
      Filesize

      24KB

    • memory/1212-71-0x0000000003F80000-0x000000000408D000-memory.dmp
      Filesize

      1.1MB

    • memory/1212-72-0x0000000004BE0000-0x0000000004D84000-memory.dmp
      Filesize

      1.6MB

    • memory/1212-74-0x0000000003F80000-0x000000000408D000-memory.dmp
      Filesize

      1.1MB

    • memory/1212-64-0x0000000004BE0000-0x0000000004D84000-memory.dmp
      Filesize

      1.6MB

    • memory/1260-66-0x0000000000000000-mapping.dmp
    • memory/1344-68-0x00000000000C0000-0x00000000000EA000-memory.dmp
      Filesize

      168KB

    • memory/1344-69-0x00000000020A0000-0x00000000023A3000-memory.dmp
      Filesize

      3.0MB

    • memory/1344-70-0x0000000001DD0000-0x0000000001E63000-memory.dmp
      Filesize

      588KB

    • memory/1344-67-0x0000000000580000-0x000000000058D000-memory.dmp
      Filesize

      52KB

    • memory/1344-73-0x00000000000C0000-0x00000000000EA000-memory.dmp
      Filesize

      168KB

    • memory/1344-65-0x0000000000000000-mapping.dmp