Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-10-2022 10:51

General

  • Target

    SOA_Invoice_04930.exe

  • Size

    620KB

  • MD5

    e980fe4c7833022bb80b70abdda382de

  • SHA1

    8d82c1696df13202dc4d41f23c6df7f5fe18abee

  • SHA256

    8a9a70ca1dd6bd611d2b77bf233ab14f62b259d510973722a1381c237b4980f9

  • SHA512

    72ab8d6ce9e55266a45d60f046ec44df1ab51c6ff20e8f0a8376285921672f9efad57c22a52d2962556dd228d18b28e3d16dc8c3266f0837745ac9f089d5d68f

  • SSDEEP

    12288:NToPWBv/cpGrU3ypp8sGT72T4g+mtCYd/1l1fS7:NTbBv5rUOysGf2kxgN9fQ

Malware Config

Extracted

Family

formbook

Campaign

hzb3

Decoy

BVGWUXYpaaEaNSjsCHhJnDJz463cqQ==

CEqdZb0KaOLLbWqrDVTgc20=

nBv0jSFiQHxtE6awQnm2

E1sGpCJYtB8ImaguUyF6yQ==

PMBND7LzJGZH7CXulclbs2c=

u9zzlFGDXo6LLbGwQnm2

SaJjLbtVlMgsP5ZQRj4=

wckwEbwBbKA2X3g=

rPxB8ePUxfu4pilu

S562QFeKY5P//qawQnm2

BkEfWXZuY3ihKW8=

ZanakqMxkP7VdNfWdD4FGDqF

PYYbtzdINC1J0OYzQCk=

Fmg9LBxaPQ==

4eXWfoC06yGAkQ0l+Txs2w==

n68j2X6+CIhsD5GiCMYBsHI=

hRv6hpW3qfLbdI1XJ/J825G1TslJ+1JE

X6PAVGfwPHihKW8=

7zn1tkuDaZ2FKbGwQnm2

lB0m5ghWsSmMpIUS8EBM31l/463cqQ==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2864
    • C:\Users\Admin\AppData\Local\Temp\SOA_Invoice_04930.exe
      "C:\Users\Admin\AppData\Local\Temp\SOA_Invoice_04930.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:3032
      • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
        "C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4884
        • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
          "C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4172
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4884 -s 576
          4⤵
          • Program crash
          PID:4212
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1236
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4060
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 4884 -ip 4884
      1⤵
        PID:3360

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Credential Access

      Credentials in Files

      1
      T1081

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Collection

      Data from Local System

      1
      T1005

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
        Filesize

        56KB

        MD5

        f57bc9937d91e877bfa7a67a22c9f2a1

        SHA1

        37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

        SHA256

        4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

        SHA512

        2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

      • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
        Filesize

        56KB

        MD5

        f57bc9937d91e877bfa7a67a22c9f2a1

        SHA1

        37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

        SHA256

        4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

        SHA512

        2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

      • C:\Users\Admin\AppData\Local\Temp\ankvqnhtdtpeous.exe
        Filesize

        56KB

        MD5

        f57bc9937d91e877bfa7a67a22c9f2a1

        SHA1

        37a4fe9701912a81e0bfe5c9ea755324eb0c6bce

        SHA256

        4b06895f150c84ee7efc045d704f322946eb7d846a44379a2b8543fe17a991b0

        SHA512

        2d40e54c3d3ead972398cbc6c62c2ca2702ad64b3102453a746fb57f09a577382b157e38ab42a58d4ba1894a11443a2c500d40660a6fc5f1b4b8bcffc46ddf92

      • C:\Users\Admin\AppData\Local\Temp\trgqsjkygi.zkc
        Filesize

        185KB

        MD5

        884f2e5433ac0ba1ab3ff5dff446b118

        SHA1

        c440ef9ce933150e8f63066e33c50a9f7dc6a653

        SHA256

        8df82e1f8dcbda6ed3ab7099e492db2af137764c8ba46e2e9cadbb2c6e7a3d45

        SHA512

        b7d5db1ce13689590860f849fbb813659997db97b78f0386eff740e5f7de15364e77869bf01fc2d4b4ae9379d034717a45c1cf9b747049e1c4294f15d0b500ec

      • C:\Users\Admin\AppData\Local\Temp\tujmf.ukj
        Filesize

        4KB

        MD5

        322c9e1f0800f6b6086e0b7e8593d0a8

        SHA1

        f562b549ee754cd3028f270c0e5fb6cac1b271ed

        SHA256

        9c65bfce3e58d250da6a8db7f15de36427b7fcaef404f77afd539c45d747026d

        SHA512

        79f389ac5d06bcfff0de14ca2101b0eef76cd032f1a6f90fb8f82cfdc7b1ae3b376877f62e715740854fd4908f0aa9cecb88e8b220988812cdf4201b04cdf1c0

      • memory/1236-146-0x0000000000F10000-0x0000000000F3D000-memory.dmp
        Filesize

        180KB

      • memory/1236-150-0x0000000000F10000-0x0000000000F3D000-memory.dmp
        Filesize

        180KB

      • memory/1236-148-0x0000000002EB0000-0x0000000002F3F000-memory.dmp
        Filesize

        572KB

      • memory/1236-147-0x0000000003210000-0x000000000355A000-memory.dmp
        Filesize

        3.3MB

      • memory/1236-144-0x0000000000000000-mapping.dmp
      • memory/1236-145-0x0000000000A10000-0x0000000000A24000-memory.dmp
        Filesize

        80KB

      • memory/2864-151-0x00000000029F0000-0x0000000002B11000-memory.dmp
        Filesize

        1.1MB

      • memory/2864-149-0x00000000029F0000-0x0000000002B11000-memory.dmp
        Filesize

        1.1MB

      • memory/2864-143-0x00000000026E0000-0x00000000027FC000-memory.dmp
        Filesize

        1.1MB

      • memory/4172-137-0x0000000000000000-mapping.dmp
      • memory/4172-142-0x0000000000F70000-0x0000000000F80000-memory.dmp
        Filesize

        64KB

      • memory/4172-140-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/4172-141-0x0000000001890000-0x0000000001BDA000-memory.dmp
        Filesize

        3.3MB

      • memory/4172-139-0x0000000000401000-0x000000000042F000-memory.dmp
        Filesize

        184KB

      • memory/4884-132-0x0000000000000000-mapping.dmp