Analysis

  • max time kernel
    148s
  • max time network
    137s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-07-2022 09:15

General

  • Target

    Ziraat Bankasi Swift Mesaji.exe

  • Size

    605KB

  • MD5

    3951678c7d514392e736a3f42a3bf422

  • SHA1

    69a7646f8abc926da7f476e87b0d47f07b15344f

  • SHA256

    7cb158ee1638efc7f9d163b16a0ef549eb28c741d5cdd0c348a23e246fd5fbdf

  • SHA512

    b8c102bbd6f6ed3233f59af809087c086a1604d2c97ae7978d431b2d52dfb1f13230a2b9ec76051c32be1db40eb960ba5be997df1953baba9d5b4caae2c69e44

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

bt62

Decoy

mmajesty.xyz

wildgoodnessgardens.com

luicodraft.xyz

tontobox.store

kericarr.com

taramayoros.com

sluesn.online

tamdavinhlong.com

powdermountain.tours

spydecelular.site

supportjamesbrown.com

lemonzest.store

kofekloud.com

you-got-a-sec.com

sunu-ocr.com

xn--nxw840bmnh.xn--czru2d

thepeninsulachicago.com

cers.online

ozmintmanagement.com

shopninib.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1032
    • C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe
      "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4772
      • C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe
        "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4300
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2328
      • C:\Windows\SysWOW64\colorcpl.exe
        "C:\Windows\SysWOW64\colorcpl.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4076
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Local\Temp\Ziraat Bankasi Swift Mesaji.exe"
          3⤵
            PID:4836

      Network

      MITRE ATT&CK Matrix

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/1032-142-0x0000000008A40000-0x0000000008B4C000-memory.dmp
        Filesize

        1.0MB

      • memory/1032-151-0x0000000003110000-0x000000000320E000-memory.dmp
        Filesize

        1016KB

      • memory/1032-150-0x0000000003110000-0x000000000320E000-memory.dmp
        Filesize

        1016KB

      • memory/4076-149-0x0000000003080000-0x0000000003113000-memory.dmp
        Filesize

        588KB

      • memory/4076-148-0x0000000001220000-0x000000000124F000-memory.dmp
        Filesize

        188KB

      • memory/4076-147-0x00000000031E0000-0x000000000352A000-memory.dmp
        Filesize

        3.3MB

      • memory/4076-144-0x0000000000520000-0x0000000000539000-memory.dmp
        Filesize

        100KB

      • memory/4076-145-0x0000000001220000-0x000000000124F000-memory.dmp
        Filesize

        188KB

      • memory/4076-143-0x0000000000000000-mapping.dmp
      • memory/4300-136-0x0000000000000000-mapping.dmp
      • memory/4300-140-0x00000000016A0000-0x00000000019EA000-memory.dmp
        Filesize

        3.3MB

      • memory/4300-141-0x0000000001B50000-0x0000000001B64000-memory.dmp
        Filesize

        80KB

      • memory/4300-139-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/4300-137-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/4772-135-0x0000000000F00000-0x0000000000F66000-memory.dmp
        Filesize

        408KB

      • memory/4772-130-0x0000000000410000-0x00000000004AE000-memory.dmp
        Filesize

        632KB

      • memory/4772-134-0x0000000006EA0000-0x0000000006F3C000-memory.dmp
        Filesize

        624KB

      • memory/4772-133-0x0000000004ED0000-0x0000000004EDA000-memory.dmp
        Filesize

        40KB

      • memory/4772-132-0x0000000004E30000-0x0000000004EC2000-memory.dmp
        Filesize

        584KB

      • memory/4772-131-0x00000000052F0000-0x0000000005894000-memory.dmp
        Filesize

        5.6MB

      • memory/4836-146-0x0000000000000000-mapping.dmp