Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    23/09/2022, 09:32

General

  • Target

    PO-11059021022021.exe

  • Size

    663KB

  • MD5

    f79dd4569875b93a8d76514917da8ed6

  • SHA1

    3cf17a7501bf43730c845efbb43bcf1135690fc4

  • SHA256

    b0a89f3465bf92183fd7cb61177ea2f13eb9ff3381ac06f4b14c642742982405

  • SHA512

    736f662b306040745bc992207cbf63a4ee0c0f0af65bf95d120ed2644ead9ceb9a965ad9329da01794ca4b8fd55b1f50f544ded39461ddaf22ee46c9bded013b

  • SSDEEP

    12288:Y3iRW/RKn40HiVwnXRxsfCQ/UIAObPDckWW9s5+oXUcC:+SHiKXuL//bPDckxs5TUc

Malware Config

Extracted

Family

formbook

Campaign

bwe0

Decoy

GA8abA96SLI=

RjM/QAsrNyRPlNEjahNMdKXlPtbXpQ==

rOQ4ySihIKVFhRnhZxfZ

iSnyAlGXQBSBwz1C

SYfcQ54ijGWAuQq1UQTE

XRcVgsQIO8FVnvCOiHLvE3k=

K2XLULRJuod6I3dO

S4oH5i5i3+expw==

4hZdto3RgCY9esve1k7T5x9YPw==

fkpgXDuEv2NzvxCcq2AxMnE=

13czFGvtsco1gf8=

ub4KhXCsZ/qnnvYTijN3dA==

WD5IRIcJB51Hfs8grBnldA==

YqxA1LPudXGKyP1FlQ==

MZHXMBdZ8Mf2X3ZjSVY=

7mLLNhchknqdLVbz+6ci4VeD

66OK6kmRv8N6I3dO

+97y8jK5vTnIn8crIwyHnRxv03Kp

PC1PqPJ6573fH0aUnGAxMnE=

3BFlt4nJcA3Inb3TGO02bq++XzWRMVg=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1296
    • C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CfBhRxzZjDw.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1116
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CfBhRxzZjDw" /XML "C:\Users\Admin\AppData\Local\Temp\tmpCBC8.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2032
      • C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe
        "C:\Users\Admin\AppData\Local\Temp\PO-11059021022021.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:836
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1256

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpCBC8.tmp

      Filesize

      1KB

      MD5

      4080244b54b05e69bd08c06ccd0be12b

      SHA1

      e22d1725e03a6586333c4ae50919518f46b0a2b8

      SHA256

      d99319fa5872b84ac5787970bbfe83b360f448e2f4574e12e29e0a53a6c8cffe

      SHA512

      147ea5e6ff810b7f27dd7029c70f274782356b4692332311a5ffc2b0f84e72bfa822bdeb2f25b5a853409b25144b4fd4284ca73744b218906251ec4699af5502

    • memory/836-68-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/836-66-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/836-73-0x0000000000AE0000-0x0000000000DE3000-memory.dmp

      Filesize

      3.0MB

    • memory/836-72-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/836-80-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/836-74-0x0000000000120000-0x0000000000130000-memory.dmp

      Filesize

      64KB

    • memory/836-65-0x0000000000400000-0x000000000042B000-memory.dmp

      Filesize

      172KB

    • memory/836-77-0x00000000001A0000-0x00000000001B0000-memory.dmp

      Filesize

      64KB

    • memory/864-55-0x0000000075141000-0x0000000075143000-memory.dmp

      Filesize

      8KB

    • memory/864-64-0x0000000001180000-0x00000000011B2000-memory.dmp

      Filesize

      200KB

    • memory/864-56-0x00000000059B0000-0x0000000005A80000-memory.dmp

      Filesize

      832KB

    • memory/864-59-0x0000000007DE0000-0x0000000007E6A000-memory.dmp

      Filesize

      552KB

    • memory/864-54-0x0000000001210000-0x00000000012BC000-memory.dmp

      Filesize

      688KB

    • memory/864-58-0x0000000000410000-0x000000000041C000-memory.dmp

      Filesize

      48KB

    • memory/864-57-0x00000000003C0000-0x00000000003DA000-memory.dmp

      Filesize

      104KB

    • memory/1116-71-0x000000006E3E0000-0x000000006E98B000-memory.dmp

      Filesize

      5.7MB

    • memory/1296-75-0x0000000006980000-0x0000000006AF9000-memory.dmp

      Filesize

      1.5MB

    • memory/1296-78-0x00000000071F0000-0x0000000007367000-memory.dmp

      Filesize

      1.5MB

    • memory/1296-85-0x0000000006B00000-0x0000000006C55000-memory.dmp

      Filesize

      1.3MB

    • memory/1296-88-0x0000000006B00000-0x0000000006C55000-memory.dmp

      Filesize

      1.3MB

    • memory/1704-81-0x0000000000480000-0x0000000000496000-memory.dmp

      Filesize

      88KB

    • memory/1704-82-0x0000000001FD0000-0x00000000022D3000-memory.dmp

      Filesize

      3.0MB

    • memory/1704-83-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB

    • memory/1704-84-0x0000000001E10000-0x0000000001E9F000-memory.dmp

      Filesize

      572KB

    • memory/1704-86-0x00000000000E0000-0x000000000010B000-memory.dmp

      Filesize

      172KB