Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-08-2022 07:52

General

  • Target

    Purchase Order 30 August 2022-02414291423394140374553.exe

  • Size

    89KB

  • MD5

    0c3e17513995f23e55698258b1182ff8

  • SHA1

    102f3d910b9b5718d32cb53c742321fdbe1f3cf8

  • SHA256

    54fae569dce7e163b82278e3353f28978511f3af6ef2f444ee5b2034a88af61e

  • SHA512

    e17a9fbb516248fc44ba6dd3175130151764f6c41b9333037485ed1ddc6941d0a7d86d67efe5a2f7d4c399833ba985e8af49f0a5a8c9cc9fb4446cd9ae47562e

  • SSDEEP

    768:M5Q7BWvdus8AS2ymNBqPrDhKD+sHmIBPu/5FXa7IkZsdmR/9UfaJAMnHSiU/2C7B:cxBMPtr/d0zRpSZ5adaht

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ba17

Decoy

zoltaron.tech

exopets.online

trippingtravel.com

banded.top

shinebrightdesigns.co.uk

djlbb.com

abcsofmindfulness.com

linkaktifasialive88.club

185068.sbs

tjhongguo.com

portaldigi.store

theshoe.club

r-ceive.app

kmwww.top

search-publishing.com

banksmanlights.net

flyonthewallmovie.com

congrulations.website

trnt.store

udajabojka.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3000
    • C:\Users\Admin\AppData\Local\Temp\Purchase Order 30 August 2022-02414291423394140374553.exe
      "C:\Users\Admin\AppData\Local\Temp\Purchase Order 30 August 2022-02414291423394140374553.exe"
      2⤵
      • Drops startup file
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3172
      • C:\Users\Admin\AppData\Local\Temp\Purchase Order 30 August 2022-02414291423394140374553.exe
        "C:\Users\Admin\AppData\Local\Temp\Purchase Order 30 August 2022-02414291423394140374553.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2508
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5104
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Purchase Order 30 August 2022-02414291423394140374553.exe"
        3⤵
          PID:3128

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2508-142-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/2508-144-0x0000000000FD0000-0x0000000000FE4000-memory.dmp
      Filesize

      80KB

    • memory/2508-143-0x0000000001480000-0x00000000017CA000-memory.dmp
      Filesize

      3.3MB

    • memory/2508-140-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/2508-139-0x0000000000000000-mapping.dmp
    • memory/3000-154-0x0000000008060000-0x0000000008132000-memory.dmp
      Filesize

      840KB

    • memory/3000-152-0x0000000008060000-0x0000000008132000-memory.dmp
      Filesize

      840KB

    • memory/3000-145-0x0000000007B00000-0x0000000007C6A000-memory.dmp
      Filesize

      1.4MB

    • memory/3128-149-0x0000000000000000-mapping.dmp
    • memory/3172-137-0x0000000006FE0000-0x000000000707C000-memory.dmp
      Filesize

      624KB

    • memory/3172-138-0x0000000007080000-0x00000000070E6000-memory.dmp
      Filesize

      408KB

    • memory/3172-132-0x0000000000EE0000-0x0000000000EFC000-memory.dmp
      Filesize

      112KB

    • memory/3172-136-0x0000000006DC0000-0x0000000006DDE000-memory.dmp
      Filesize

      120KB

    • memory/3172-135-0x00000000059A0000-0x0000000005A16000-memory.dmp
      Filesize

      472KB

    • memory/3172-134-0x00000000058B0000-0x0000000005942000-memory.dmp
      Filesize

      584KB

    • memory/3172-133-0x0000000005F50000-0x00000000064F4000-memory.dmp
      Filesize

      5.6MB

    • memory/5104-146-0x0000000000000000-mapping.dmp
    • memory/5104-148-0x0000000000840000-0x000000000086F000-memory.dmp
      Filesize

      188KB

    • memory/5104-147-0x0000000000030000-0x000000000004F000-memory.dmp
      Filesize

      124KB

    • memory/5104-150-0x0000000002770000-0x0000000002ABA000-memory.dmp
      Filesize

      3.3MB

    • memory/5104-151-0x00000000025B0000-0x0000000002643000-memory.dmp
      Filesize

      588KB

    • memory/5104-153-0x0000000000840000-0x000000000086F000-memory.dmp
      Filesize

      188KB