Analysis

  • max time kernel
    150s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17/09/2022, 22:53

General

  • Target

    MT10386867902-004. pdf.exe

  • Size

    1.1MB

  • MD5

    0bdc1fda2cc607187dc341cc25827e5a

  • SHA1

    7248bf8f4d29a9d3c2e70c1b987b6464713e5f39

  • SHA256

    33b4616c77120e6805e6291a245901aaf59a3ff29ab585684aa9ff4261b88425

  • SHA512

    7b9bc1f282cbafa54a5421d67b96b682510f081ed94d94328453b5fa37f532f3a71d17ac12979bfce55faa2b23b2857745c7b4599f8ffd47a167e6e660240899

  • SSDEEP

    24576:sONzSIoHIbBEAX+b0cM9/+TY0kNUYuy1aCb:sYzSI+IdEBb/MgTY0kNIy1/b

Malware Config

Extracted

Family

formbook

Campaign

tdet

Decoy

flecOADaqXPdGREyc2S5U7in

KVyI9ev7H+7QNmD2Ypo=

/dS+buXK9NuzGmk+HDCRUfazFQ==

IHpkgl+nN4I0gAnczMbM7asQ708Cbt0=

UkVGwHvEpCcYba0OBA==

VTsq0ruLmB+azL+lXZkZRw==

5qToiFYvMKMD8W5dGQ==

S4rU9cAx619SvJr10kpU4XCfj6w=

9ymGAMljBH9nres8Ew==

BZeWfy6ACwx4uKkD66doyXuv

prCtFMOp06JaczompuX6D8VIKExtMFEs

dePiDR+zZNPBHPeGJAWv

OAR/oEfQWJ5S4N83XZkZRw==

t3LunnRUcdmGtd0rDg==

YAg6s7KVxrMcXPB/fJQLQQ==

t9oRP+fGiZ5WqdhnAg==

6nyt4oS6VLCeC907L8blYIuxEw==

rzQ6JM4sjRjA+TBcNpQ=

VILmlp6qylo/bMw=

bGqKNd1c+/9ptjYJ6adoyXuv

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 40 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3080
    • C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3576
      • C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\MT10386867902-004. pdf.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3036
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2816
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:2344

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2816-154-0x00000000009C0000-0x00000000009EB000-memory.dmp

      Filesize

      172KB

    • memory/2816-153-0x0000000002EE0000-0x0000000002F6F000-memory.dmp

      Filesize

      572KB

    • memory/2816-152-0x0000000002B00000-0x0000000002E4A000-memory.dmp

      Filesize

      3.3MB

    • memory/2816-151-0x00000000009C0000-0x00000000009EB000-memory.dmp

      Filesize

      172KB

    • memory/2816-150-0x00000000003B0000-0x00000000007E3000-memory.dmp

      Filesize

      4.2MB

    • memory/3036-149-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/3036-141-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/3036-142-0x0000000001230000-0x000000000157A000-memory.dmp

      Filesize

      3.3MB

    • memory/3036-143-0x0000000000990000-0x00000000009A0000-memory.dmp

      Filesize

      64KB

    • memory/3036-146-0x00000000015B0000-0x00000000015C0000-memory.dmp

      Filesize

      64KB

    • memory/3036-139-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/3080-155-0x0000000002D10000-0x0000000002DF3000-memory.dmp

      Filesize

      908KB

    • memory/3080-144-0x0000000002900000-0x0000000002A65000-memory.dmp

      Filesize

      1.4MB

    • memory/3080-147-0x0000000007C10000-0x0000000007D83000-memory.dmp

      Filesize

      1.4MB

    • memory/3080-156-0x0000000002D10000-0x0000000002DF3000-memory.dmp

      Filesize

      908KB

    • memory/3576-132-0x0000000000010000-0x000000000012A000-memory.dmp

      Filesize

      1.1MB

    • memory/3576-135-0x0000000004C70000-0x0000000004C7A000-memory.dmp

      Filesize

      40KB

    • memory/3576-134-0x0000000004AC0000-0x0000000004B52000-memory.dmp

      Filesize

      584KB

    • memory/3576-133-0x0000000005120000-0x00000000056C4000-memory.dmp

      Filesize

      5.6MB

    • memory/3576-136-0x00000000078A0000-0x000000000793C000-memory.dmp

      Filesize

      624KB

    • memory/3576-137-0x0000000007940000-0x00000000079A6000-memory.dmp

      Filesize

      408KB