Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220721-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-08-2022 21:41

General

  • Target

    INVOICES.exe

  • Size

    996KB

  • MD5

    edfc6e2add36e49c8c9e010db0eb0632

  • SHA1

    69697675cdc6d2c26db0709339bfd8f42044e7b6

  • SHA256

    86871dd03f2da6c6de34710060ddc726fae5907f1f48d37c26d23f4d3d3f9bb8

  • SHA512

    61dd86fe6c09ecb2e8e107a0aa6f93d0d44334f873c3fb4b842be5e4da26e72ad53cc65c202fe9aca0ef540021ed4ddbe4f3fa9030886d835ff6ad74c894cac6

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ee27

Decoy

gasimportsfiles.com

hospitaljobsindia.com

mymortgagecantips.xyz

yourenotalone.world

livethejesuslife.com

sobernv.com

bobgruber.online

badu100.com

id98qq12.com

naturalex.co.uk

metathrillrides.com

blessingstowing.com

juddsbarandgrill.com

qrcodemania.com

haodaculture.com

obot.xyz

soupmortgagemark.xyz

top-road.com

xiaoterv.com

madrstyonline.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Formbook payload 4 IoCs
  • ModiLoader Second Stage 62 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:768
    • C:\Users\Admin\AppData\Local\Temp\INVOICES.exe
      "C:\Users\Admin\AppData\Local\Temp\INVOICES.exe"
      2⤵
      • Checks computer location settings
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4280
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\System32\cmd.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4484
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1172
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\SysWOW64\cmd.exe"
        3⤵
          PID:4704
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:2060

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    3
    T1012

    System Information Discovery

    4
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/768-248-0x0000000008230000-0x0000000008349000-memory.dmp
      Filesize

      1.1MB

    • memory/768-258-0x00000000084C0000-0x00000000085B9000-memory.dmp
      Filesize

      996KB

    • memory/768-256-0x00000000084C0000-0x00000000085B9000-memory.dmp
      Filesize

      996KB

    • memory/1172-257-0x0000000000B90000-0x0000000000BBF000-memory.dmp
      Filesize

      188KB

    • memory/1172-255-0x0000000002AD0000-0x0000000002B63000-memory.dmp
      Filesize

      588KB

    • memory/1172-254-0x0000000002C30000-0x0000000002F7A000-memory.dmp
      Filesize

      3.3MB

    • memory/1172-252-0x0000000000B90000-0x0000000000BBF000-memory.dmp
      Filesize

      188KB

    • memory/1172-251-0x0000000000850000-0x0000000000862000-memory.dmp
      Filesize

      72KB

    • memory/1172-249-0x0000000000000000-mapping.dmp
    • memory/4280-198-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-202-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-171-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-172-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-173-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-174-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-175-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-176-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-177-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-178-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-179-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-180-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-181-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-182-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-183-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-184-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-185-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-187-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-186-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-188-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-189-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-190-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-191-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-192-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-193-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-194-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-195-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-196-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-197-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-148-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-199-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-200-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-201-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-170-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-203-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-204-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-161-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-207-0x0000000050410000-0x000000005043F000-memory.dmp
      Filesize

      188KB

    • memory/4280-208-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-209-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-210-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-211-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-212-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-213-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-214-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-215-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-216-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-217-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-162-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-218-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-220-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-221-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-223-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-224-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-225-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-226-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-163-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-169-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-168-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-164-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-167-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-166-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4280-165-0x0000000003C30000-0x0000000003CCF000-memory.dmp
      Filesize

      636KB

    • memory/4484-250-0x0000000050410000-0x000000005043F000-memory.dmp
      Filesize

      188KB

    • memory/4484-247-0x00000000012E0000-0x00000000012F4000-memory.dmp
      Filesize

      80KB

    • memory/4484-219-0x00000000013E0000-0x000000000172A000-memory.dmp
      Filesize

      3.3MB

    • memory/4484-205-0x0000000000000000-mapping.dmp
    • memory/4704-253-0x0000000000000000-mapping.dmp