Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-10-2022 07:00

General

  • Target

    TDD500000000000000000000000000000000000000.exe

  • Size

    713KB

  • MD5

    813890550ca56d37b0a986bf8cdde0b1

  • SHA1

    88c1c4caca723a71c3f308fc8d66a44eb4a0230f

  • SHA256

    3b56d7fd728103d3269e18e272e22d521d7c6c2304a2665217b1000631dded9d

  • SHA512

    b29a49c5a17c2e91eeeb07816f39b0445a638452dde9841762c6a6130ee357320183f3cd68a299dc31f534d6c5dcf8839218fdbf49aca8a51d49bc4a247043e7

  • SSDEEP

    12288:8ToPWBv/cpGrU3yH7mtstmTHIoELSbcV1W4WdV0zJPx:8TbBv5rUsmymTo7LSYxPx

Malware Config

Extracted

Family

formbook

Campaign

qqci

Decoy

QetTqZClp7wFVN7CUjvCiA==

3ZTYDLbtEiw+OynhJ9HGmQ==

ZyJunbSaaekF

OOwyczoCsSvKuI0H

S/FAZYtKY2vVzCc5qIiU

axVWijjhaCVDmZpGTt3RUxGrgZIZjcapEw==

1oHQ73CAnJntuX8=

Huo0LA3V+0JZHgONI/JPQ8UJ

BKzl63IkrnSA5W41XFM=

yoHbAS7smafIszYSGkQ=

iTyFttfzdTBbmGkOV67Mjg==

KcwIME5r+IeTEv+4PVTMOV2tqTzT3w==

FLXq6sZddO4Fm4VR95ScwqT66yI=

u2SjgGoNCB0lHuGBpskelaT66yI=

0YrQwnYjYNF2v3sQ

l0O9vrjpiyM91b54/JPPguMe

P+BLw9L68iIY

AZQeZo+7cXLIRN2gtg==

K94UQ2snUJC3gl45qIiU

vlewBydLxlB05sOKHzbPguMe

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2180
    • C:\Users\Admin\AppData\Local\Temp\TDD500000000000000000000000000000000000000.exe
      "C:\Users\Admin\AppData\Local\Temp\TDD500000000000000000000000000000000000000.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3988
      • C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe
        "C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2320
        • C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe
          "C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1428
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2320 -s 528
          4⤵
          • Program crash
          PID:344
    • C:\Windows\SysWOW64\WWAHost.exe
      "C:\Windows\SysWOW64\WWAHost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4808
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2320 -ip 2320
      1⤵
        PID:2624

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe
        Filesize

        56KB

        MD5

        d0e90c275950aa6655921911057a9b8e

        SHA1

        56f2a2c421510e2772edee874e146196a5409597

        SHA256

        ff1bc96bcef0db6b933fefa041e8e38fbec9192d4ea53b309e5ba95ffb8b1ec8

        SHA512

        486fcfc96b28e20b6532fdf5ef6a986f25a3729b2c5331fd09291f999f841e820a52302ff3ff612873414aa683176b942eadac5c35605f70d7f7d9ed736df549

      • C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe
        Filesize

        56KB

        MD5

        d0e90c275950aa6655921911057a9b8e

        SHA1

        56f2a2c421510e2772edee874e146196a5409597

        SHA256

        ff1bc96bcef0db6b933fefa041e8e38fbec9192d4ea53b309e5ba95ffb8b1ec8

        SHA512

        486fcfc96b28e20b6532fdf5ef6a986f25a3729b2c5331fd09291f999f841e820a52302ff3ff612873414aa683176b942eadac5c35605f70d7f7d9ed736df549

      • C:\Users\Admin\AppData\Local\Temp\frqcewggrhw.exe
        Filesize

        56KB

        MD5

        d0e90c275950aa6655921911057a9b8e

        SHA1

        56f2a2c421510e2772edee874e146196a5409597

        SHA256

        ff1bc96bcef0db6b933fefa041e8e38fbec9192d4ea53b309e5ba95ffb8b1ec8

        SHA512

        486fcfc96b28e20b6532fdf5ef6a986f25a3729b2c5331fd09291f999f841e820a52302ff3ff612873414aa683176b942eadac5c35605f70d7f7d9ed736df549

      • C:\Users\Admin\AppData\Local\Temp\qnzrnm.mwx
        Filesize

        4KB

        MD5

        54c2259abdb49f848bdba460ed858024

        SHA1

        7e655cb9bda0b43fc00e60615a3a87582f2c55f8

        SHA256

        2998820c59e87763d0106ff04418db0ddd5623590dd97f5e9de4ad42bc7c6148

        SHA512

        6a317219345a48639912dfa4d080f22e2d070f7c3d2f286dc38414b91ede67ca421d8fa29e65f7fbd019ba2ce0dd92cca4fa6bd4346f6d15909b5e8e0b1cf9f8

      • C:\Users\Admin\AppData\Local\Temp\wxqklo.lgy
        Filesize

        185KB

        MD5

        5a21846043f65aeaab1a75e456fea017

        SHA1

        29af7fc55f4e3e3a98f4f298c062dab4f4c3ad47

        SHA256

        af680a037c85b1bff053ad6a4d5b4bf919fcd55230f0cd719a2a473c4ffe2f92

        SHA512

        d7dbb860b99dc34a2156934277fce9507cae2b59da2e2eb06d61c60001610dfebc189e2ce4e9fe491b05e4f0ce9225142b8849a26b0a12b27c612c230bb97738

      • memory/1428-142-0x0000000000C50000-0x0000000000C60000-memory.dmp
        Filesize

        64KB

      • memory/1428-139-0x0000000000401000-0x000000000042F000-memory.dmp
        Filesize

        184KB

      • memory/1428-140-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1428-141-0x0000000001210000-0x000000000155A000-memory.dmp
        Filesize

        3.3MB

      • memory/1428-137-0x0000000000000000-mapping.dmp
      • memory/1428-145-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/2180-150-0x0000000008380000-0x00000000084E0000-memory.dmp
        Filesize

        1.4MB

      • memory/2180-143-0x0000000003610000-0x0000000003766000-memory.dmp
        Filesize

        1.3MB

      • memory/2180-152-0x0000000008380000-0x00000000084E0000-memory.dmp
        Filesize

        1.4MB

      • memory/2320-132-0x0000000000000000-mapping.dmp
      • memory/4092-144-0x0000000000000000-mapping.dmp
      • memory/4092-148-0x0000000001360000-0x00000000016AA000-memory.dmp
        Filesize

        3.3MB

      • memory/4092-147-0x00000000006B0000-0x00000000006DD000-memory.dmp
        Filesize

        180KB

      • memory/4092-149-0x00000000010A0000-0x000000000112F000-memory.dmp
        Filesize

        572KB

      • memory/4092-151-0x00000000006B0000-0x00000000006DD000-memory.dmp
        Filesize

        180KB

      • memory/4092-146-0x0000000000720000-0x00000000007FC000-memory.dmp
        Filesize

        880KB