Analysis

  • max time kernel
    148s
  • max time network
    147s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-09-2022 06:36

General

  • Target

    jets4431.exe

  • Size

    1.1MB

  • MD5

    71415d61dd3a653e017514280a4e05c4

  • SHA1

    89bed5f613401c5816f3b22816f84d5f8067db3b

  • SHA256

    3ab1cc60bd5dca00fc6cad5cf3c0a7cccea610b20027c9db6b45f0b41860fba5

  • SHA512

    971407b4327c3a9fe1ff76f0ec84874522865ae08f338ec0985a1ef78066a59412d323a4a2731d33dec129c89355b7aa95fe36f4425db8ad6ea1151f5b9c2098

  • SSDEEP

    24576:UAOcZXcxP61ptWw+avL8pnp3qY7daGAuvZG31RMaas/xmR:CH+tWw+S8D3r70QA3XM9n

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

je14

Decoy

innervisionbuildings.com

theenergysocialite.com

565548.com

panghr.com

onlyonesolutions.com

stjohnzone6.com

cnotes.rest

helfeb.online

xixi-s-inc.club

easilyentered.com

theshopx.store

mrclean-ac.com

miamibeachwateradventures.com

jpearce.co.uk

seseragi-bunkou.com

minimaddie.com

commbank-help-849c3.com

segohandelsonderneming.com

namthanhreal.com

fototerapi.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 10 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 4 IoCs
  • Suspicious use of SetThreadContext 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\jets4431.exe
      "C:\Users\Admin\AppData\Local\Temp\jets4431.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:896
      • C:\Users\Admin\AppData\Roaming\5_29\estrlf.pif
        "C:\Users\Admin\AppData\Roaming\5_29\estrlf.pif" tvsgb.tls
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1124
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:628
    • C:\Windows\SysWOW64\autoconv.exe
      "C:\Windows\SysWOW64\autoconv.exe"
      2⤵
        PID:592
      • C:\Windows\SysWOW64\svchost.exe
        "C:\Windows\SysWOW64\svchost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1380
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:1708
        • C:\Windows\SysWOW64\help.exe
          "C:\Windows\SysWOW64\help.exe"
          2⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1832

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\5_29\estrlf.pif
        Filesize

        794KB

        MD5

        18e404787e9c044105f5c4bec4600bd8

        SHA1

        9f1015bd7f33a6f3c1cc12c0971f51b1adee1939

        SHA256

        e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12

        SHA512

        c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f

      • C:\Users\Admin\AppData\Roaming\5_29\gdrqa.icm
        Filesize

        41KB

        MD5

        285afea69a2e1f8aae59a0c748aa2bd8

        SHA1

        8a087a497757b6beccf483687fb0d1edec45d3fa

        SHA256

        86aeb596d5962ca2389b1dcc252d0ae7b869b9e6ec319e76a387b0bb16baa910

        SHA512

        2ef2acb9b6377e85e2cf73db99555c91456ecd29dc842dc75f414ff2fbad6667c2c8d0af38a0ffd7a23c7c6a0bb28889671eeb42f61777a0dea85cbfe2cf4404

      • C:\Users\Admin\AppData\Roaming\5_29\tvsgb.tls
        Filesize

        163.3MB

        MD5

        5ad0013bd9927682146d60065da2cc2b

        SHA1

        a3954227b0b6e7d9ca4a8107219eb01b81e5697e

        SHA256

        ee9872a43ecb872238e1bcca27df64b90071816f121d1f1685beec0e01cd5c39

        SHA512

        f931e9cd85481537f2ca25b7aa4ec435a81a9d98beff46b16e2408a84caf2aeeca4cfab1d6b0bd3fdb97a7cbc14186c3afee9935d66915c27a1b26b1739e0ad5

      • C:\Users\Admin\AppData\Roaming\5_29\xaguexgkmu.xvk
        Filesize

        370KB

        MD5

        56f43e5edcbdfcf4a7e9b8c09c0d2ba2

        SHA1

        1d47312b6eacbf63b04f83a9b4cd2dad238ae17a

        SHA256

        a26e71e81529a9cb7aa276618d014c5275cf3f7c356efb0e6b2308e30727a0fb

        SHA512

        8dd0f07a966aaf0c76fbdbed51184c2d765611128ce9b6e978229dc4954357c78cabef185e636e59827ffb7841913a0d543d60231e1f70aea2d62b0f917eba8a

      • \Users\Admin\AppData\Roaming\5_29\estrlf.pif
        Filesize

        794KB

        MD5

        18e404787e9c044105f5c4bec4600bd8

        SHA1

        9f1015bd7f33a6f3c1cc12c0971f51b1adee1939

        SHA256

        e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12

        SHA512

        c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f

      • \Users\Admin\AppData\Roaming\5_29\estrlf.pif
        Filesize

        794KB

        MD5

        18e404787e9c044105f5c4bec4600bd8

        SHA1

        9f1015bd7f33a6f3c1cc12c0971f51b1adee1939

        SHA256

        e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12

        SHA512

        c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f

      • \Users\Admin\AppData\Roaming\5_29\estrlf.pif
        Filesize

        794KB

        MD5

        18e404787e9c044105f5c4bec4600bd8

        SHA1

        9f1015bd7f33a6f3c1cc12c0971f51b1adee1939

        SHA256

        e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12

        SHA512

        c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f

      • \Users\Admin\AppData\Roaming\5_29\estrlf.pif
        Filesize

        794KB

        MD5

        18e404787e9c044105f5c4bec4600bd8

        SHA1

        9f1015bd7f33a6f3c1cc12c0971f51b1adee1939

        SHA256

        e15984dc8ea9627d370c40178676490129427e2dc23499f68c9c65c4386fea12

        SHA512

        c6a1faae524968351b4841665bfe1c5255f7e6c115b7a81a4b6c65626f23f7f15e4bb856914fce15225c33a2e2b6166b3f1f87698895fe0ce4cb084b630c2a5f

      • memory/628-77-0x0000000000770000-0x0000000000A73000-memory.dmp
        Filesize

        3.0MB

      • memory/628-93-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/628-66-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/628-65-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/628-68-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/628-69-0x000000000041F120-mapping.dmp
      • memory/628-90-0x0000000000590000-0x00000000005A4000-memory.dmp
        Filesize

        80KB

      • memory/628-78-0x00000000002C0000-0x00000000002D4000-memory.dmp
        Filesize

        80KB

      • memory/628-75-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/896-54-0x0000000075B41000-0x0000000075B43000-memory.dmp
        Filesize

        8KB

      • memory/916-59-0x0000000000000000-mapping.dmp
      • memory/1124-84-0x0000000000400000-0x0000000000964000-memory.dmp
        Filesize

        5.4MB

      • memory/1124-72-0x0000000000400000-0x0000000000964000-memory.dmp
        Filesize

        5.4MB

      • memory/1124-70-0x0000000000400000-0x0000000000964000-memory.dmp
        Filesize

        5.4MB

      • memory/1124-80-0x0000000001010000-0x0000000001313000-memory.dmp
        Filesize

        3.0MB

      • memory/1124-81-0x0000000000190000-0x00000000001A4000-memory.dmp
        Filesize

        80KB

      • memory/1124-73-0x000000000041F120-mapping.dmp
      • memory/1360-82-0x0000000006830000-0x000000000693D000-memory.dmp
        Filesize

        1.1MB

      • memory/1360-99-0x0000000006830000-0x000000000693D000-memory.dmp
        Filesize

        1.1MB

      • memory/1360-98-0x00000000049F0000-0x0000000004AB5000-memory.dmp
        Filesize

        788KB

      • memory/1360-101-0x00000000049F0000-0x0000000004AB5000-memory.dmp
        Filesize

        788KB

      • memory/1360-91-0x0000000006D40000-0x0000000006E43000-memory.dmp
        Filesize

        1.0MB

      • memory/1360-79-0x00000000040F0000-0x00000000041BA000-memory.dmp
        Filesize

        808KB

      • memory/1380-88-0x0000000000080000-0x00000000000AF000-memory.dmp
        Filesize

        188KB

      • memory/1380-86-0x0000000000810000-0x0000000000818000-memory.dmp
        Filesize

        32KB

      • memory/1380-97-0x0000000000720000-0x00000000007B3000-memory.dmp
        Filesize

        588KB

      • memory/1380-87-0x00000000009B0000-0x0000000000CB3000-memory.dmp
        Filesize

        3.0MB

      • memory/1380-100-0x0000000000080000-0x00000000000AF000-memory.dmp
        Filesize

        188KB

      • memory/1380-83-0x0000000000000000-mapping.dmp
      • memory/1708-85-0x0000000000000000-mapping.dmp
      • memory/1832-92-0x0000000000000000-mapping.dmp
      • memory/1832-94-0x0000000000C60000-0x0000000000C66000-memory.dmp
        Filesize

        24KB

      • memory/1832-95-0x0000000000120000-0x000000000014F000-memory.dmp
        Filesize

        188KB

      • memory/1832-96-0x0000000000740000-0x0000000000A43000-memory.dmp
        Filesize

        3.0MB