Analysis

  • max time kernel
    150s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    05-08-2022 20:44

General

  • Target

    SWIFT_5201660828948016.pdf.exe

  • Size

    12KB

  • MD5

    7735d8206f9275cf9d880695f5c51b1e

  • SHA1

    df731f57a07985af8dc540d9cb828cbce2513a32

  • SHA256

    bd653c9f26663d5ceb9c21dcbefb79f4a6c3d28e9c2363857a51d4daeab04a71

  • SHA512

    855c0fa50de7679f8c05e5e13a1c53372ebac007a2169b9916214479e1031e31939a322057bc48ee9d3b105cbe2c46dda33b65986c6619e10615733f4ead7b13

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

s4s9

Decoy

qianyuandianshang.com

bernardklein.com

slhomeservices.com

findasaas.com

janellelancaster.xyz

umkpro.site

nr6949.online

mersquare.club

lanariproperties.com

3rdeyefocused.com

giftexpress8260.xyz

hilleleven.xyz

beajod.com

kosazs.online

ishare.team

mb314.com

xjjinxingda.com

ayekooprojectamazing.com

ballsybanter.com

todayshoppingbd.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1384
    • C:\Users\Admin\AppData\Local\Temp\SWIFT_5201660828948016.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\SWIFT_5201660828948016.pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1212
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -enc UwB0AGEAcgB0AC0AUwBsAGUAZQBwACAALQBTAGUAYwBvAG4AZABzACAAMgA=
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1372
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1820
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:328

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/328-72-0x0000000000000000-mapping.dmp
    • memory/1212-54-0x0000000000CF0000-0x0000000000CF8000-memory.dmp
      Filesize

      32KB

    • memory/1212-55-0x0000000075731000-0x0000000075733000-memory.dmp
      Filesize

      8KB

    • memory/1212-56-0x000000000D1B0000-0x000000000D3C0000-memory.dmp
      Filesize

      2.1MB

    • memory/1288-67-0x0000000000830000-0x0000000000B33000-memory.dmp
      Filesize

      3.0MB

    • memory/1288-61-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1288-62-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1288-64-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1288-65-0x000000000041F0E0-mapping.dmp
    • memory/1288-68-0x0000000000200000-0x0000000000214000-memory.dmp
      Filesize

      80KB

    • memory/1288-71-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1372-59-0x000000006F110000-0x000000006F6BB000-memory.dmp
      Filesize

      5.7MB

    • memory/1372-60-0x000000006F110000-0x000000006F6BB000-memory.dmp
      Filesize

      5.7MB

    • memory/1372-57-0x0000000000000000-mapping.dmp
    • memory/1384-77-0x0000000006890000-0x00000000069A5000-memory.dmp
      Filesize

      1.1MB

    • memory/1384-69-0x0000000006410000-0x00000000064CC000-memory.dmp
      Filesize

      752KB

    • memory/1384-79-0x0000000006890000-0x00000000069A5000-memory.dmp
      Filesize

      1.1MB

    • memory/1820-70-0x0000000000000000-mapping.dmp
    • memory/1820-75-0x0000000000860000-0x0000000000B63000-memory.dmp
      Filesize

      3.0MB

    • memory/1820-76-0x0000000000620000-0x00000000006B3000-memory.dmp
      Filesize

      588KB

    • memory/1820-74-0x00000000000C0000-0x00000000000EF000-memory.dmp
      Filesize

      188KB

    • memory/1820-78-0x00000000000C0000-0x00000000000EF000-memory.dmp
      Filesize

      188KB

    • memory/1820-73-0x0000000000E90000-0x0000000000E98000-memory.dmp
      Filesize

      32KB