Analysis

  • max time kernel
    146s
  • max time network
    113s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 08:45

General

  • Target

    MY0025007022.exe

  • Size

    67KB

  • MD5

    09d635e7fac13ca49037a27ffa10cdbf

  • SHA1

    b12b7a877682838b5b1673ee4783bbf44eba4863

  • SHA256

    b12c23f3cf0937291c634f1505ca5123dc08363dcc0f766ac029b1238cade11d

  • SHA512

    f50052ccd601ef2830e0c1a5df7e4414249e55acc8aeef3a0eb1ca16f8d92da372ae25a94fc6a9deda85a812e01104f9000b429dc70cbcab0bc6fb46aaf12f85

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

fs44

Decoy

whneat.com

jljcw.net

pocodelivery.com

outofplacezine.com

yavuzcansigorta.com

xinhewood-cn.com

cartogogh.com

5avis.com

joyceyong.art

digitalsurf.community

blackcreekbarns.com

magazinedistribuidor.com

sportsgross.com

drevom.online

mayibeofservice.com

gareloi-digit.com

permitha.net

renaissanceestetica.com

facts-r-friends.com

dach-loc.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • suricata: ET MALWARE FormBook CnC Checkin (GET)

    suricata: ET MALWARE FormBook CnC Checkin (GET)

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1396
    • C:\Users\Admin\AppData\Local\Temp\MY0025007022.exe
      "C:\Users\Admin\AppData\Local\Temp\MY0025007022.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1304
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMwAwAA==
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1524
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe purecrypter
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1892
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1472
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1632

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1304-54-0x0000000000F20000-0x0000000000F36000-memory.dmp
      Filesize

      88KB

    • memory/1304-55-0x0000000075A61000-0x0000000075A63000-memory.dmp
      Filesize

      8KB

    • memory/1304-56-0x0000000004F10000-0x0000000004F88000-memory.dmp
      Filesize

      480KB

    • memory/1304-57-0x0000000005660000-0x00000000056F2000-memory.dmp
      Filesize

      584KB

    • memory/1396-81-0x0000000006FA0000-0x000000000711A000-memory.dmp
      Filesize

      1.5MB

    • memory/1396-72-0x0000000006990000-0x0000000006B3C000-memory.dmp
      Filesize

      1.7MB

    • memory/1396-79-0x0000000006FA0000-0x000000000711A000-memory.dmp
      Filesize

      1.5MB

    • memory/1472-80-0x00000000001C0000-0x00000000001EF000-memory.dmp
      Filesize

      188KB

    • memory/1472-78-0x00000000021F0000-0x0000000002283000-memory.dmp
      Filesize

      588KB

    • memory/1472-75-0x000000004A810000-0x000000004A85C000-memory.dmp
      Filesize

      304KB

    • memory/1472-77-0x0000000001EE0000-0x00000000021E3000-memory.dmp
      Filesize

      3.0MB

    • memory/1472-76-0x00000000001C0000-0x00000000001EF000-memory.dmp
      Filesize

      188KB

    • memory/1472-73-0x0000000000000000-mapping.dmp
    • memory/1524-61-0x000000006F450000-0x000000006F9FB000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-62-0x000000006F450000-0x000000006F9FB000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-60-0x000000006F450000-0x000000006F9FB000-memory.dmp
      Filesize

      5.7MB

    • memory/1524-58-0x0000000000000000-mapping.dmp
    • memory/1632-74-0x0000000000000000-mapping.dmp
    • memory/1892-70-0x0000000000850000-0x0000000000B53000-memory.dmp
      Filesize

      3.0MB

    • memory/1892-71-0x0000000000280000-0x0000000000294000-memory.dmp
      Filesize

      80KB

    • memory/1892-69-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1892-63-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1892-64-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1892-66-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1892-67-0x000000000041F110-mapping.dmp