Analysis

  • max time kernel
    148s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2022, 05:27

General

  • Target

    PO - 00442622092022.exe

  • Size

    801KB

  • MD5

    732f86424adf702d9a0f974e04998604

  • SHA1

    4a384ef43bf4e40a5d497c06d03b0f1aa27595f1

  • SHA256

    e7104f2261f0eac61f2f5c3e316f32475d10b1e4a0df6323f400d1446807d4a0

  • SHA512

    78cba0dab0ae85efed5d3231881cdef209bcb2e3b7991d5e7f2ee6132189a42cb6292db2c7952add6410146c6b199ae0c31592cb541f0e67f5a07019be9744aa

  • SSDEEP

    12288:eg//VuZymCPhBbmuadf+0GYdSmVWX0+1gkksDvFbO1lfd:TEymC5VmRdW0zdNWj5ksWlf

Malware Config

Extracted

Family

formbook

Campaign

vez2

Decoy

GCFh2WRY8h1RjEXapwS7Ck9LsYM=

Kw/ixUjrf6eR4l/24Q==

UU+jUhRwjrFC148Z

QbmEkwuT9vV0auS9f1g=

X/Bx/B8ftQ==

VkMUQmSy0OalCood8g==

BNLY7KKp9TVIQOS9f1g=

4T0IQw/gaKqntY81D2bTIzrbjw==

hVWRNvRVcKktVh2ymZKRgeSyJ0RoIbo=

Fef69GXN5DS86bNZQiZFu/q98os=

28+h068jMHplsKGaJQxI

5kXPNMQEFGjp6MuaJQxI

3U8XDYYOlJwvdF0f4w==

XVqaJqutwWlhek3SahJ4hg==

8g9h2U1zhLBC148Z

Q8NMHfa/7y+yrZpDEgLiBZBvwVt9Vvm5

jXeQnSyl0RXqI/ulQvZ9jA==

3cHSwlLqCBnkOQy9jXZ7AiKZ

6PU7tS0owgIcNy/fahJ4hg==

WVMuelelvwPA9XaFQtUSN8o=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\PO - 00442622092022.exe
      "C:\Users\Admin\AppData\Local\Temp\PO - 00442622092022.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\PO - 00442622092022.exe
        "C:\Users\Admin\AppData\Local\Temp\PO - 00442622092022.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:680
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1884
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1336

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Local\Temp\sqlite3.dll

            Filesize

            902KB

            MD5

            50338cc1fa2582fa0cad8a8fa7ceb4d2

            SHA1

            ae697ef05b6bec38fb79ff4512ae50a303dcdbce

            SHA256

            0815a80fa73286d8c6bf0982471c61833821d9f10a20612deaa134562e7a3cda

            SHA512

            02a006e26b1d08cb53a4b3dab23ce6a6756a7275f8b3ef00b7412f10cff75411685a3542c5dc330dad7c9f7ff26288a2e94254d00bf53c1394e7252e000c9a61

          • memory/680-70-0x0000000000120000-0x0000000000130000-memory.dmp

            Filesize

            64KB

          • memory/680-77-0x0000000000401000-0x000000000042F000-memory.dmp

            Filesize

            184KB

          • memory/680-76-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/680-73-0x00000000001A0000-0x00000000001B0000-memory.dmp

            Filesize

            64KB

          • memory/680-72-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/680-60-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/680-61-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/680-63-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/680-66-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/680-67-0x0000000000401000-0x000000000042F000-memory.dmp

            Filesize

            184KB

          • memory/680-69-0x0000000000970000-0x0000000000C73000-memory.dmp

            Filesize

            3.0MB

          • memory/1232-82-0x00000000049B0000-0x0000000004A5E000-memory.dmp

            Filesize

            696KB

          • memory/1232-71-0x0000000004F30000-0x000000000508E000-memory.dmp

            Filesize

            1.4MB

          • memory/1232-85-0x00000000049B0000-0x0000000004A5E000-memory.dmp

            Filesize

            696KB

          • memory/1232-74-0x0000000006A70000-0x0000000006BC5000-memory.dmp

            Filesize

            1.3MB

          • memory/1600-58-0x00000000054E0000-0x0000000005570000-memory.dmp

            Filesize

            576KB

          • memory/1600-57-0x0000000000330000-0x000000000033C000-memory.dmp

            Filesize

            48KB

          • memory/1600-56-0x0000000000320000-0x0000000000334000-memory.dmp

            Filesize

            80KB

          • memory/1600-54-0x0000000000EC0000-0x0000000000F8E000-memory.dmp

            Filesize

            824KB

          • memory/1600-59-0x0000000000D00000-0x0000000000D34000-memory.dmp

            Filesize

            208KB

          • memory/1600-55-0x0000000076461000-0x0000000076463000-memory.dmp

            Filesize

            8KB

          • memory/1884-81-0x0000000001D80000-0x0000000001E0F000-memory.dmp

            Filesize

            572KB

          • memory/1884-78-0x00000000000D0000-0x00000000000DD000-memory.dmp

            Filesize

            52KB

          • memory/1884-80-0x0000000001E90000-0x0000000002193000-memory.dmp

            Filesize

            3.0MB

          • memory/1884-79-0x0000000000080000-0x00000000000AD000-memory.dmp

            Filesize

            180KB

          • memory/1884-83-0x0000000000080000-0x00000000000AD000-memory.dmp

            Filesize

            180KB