Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2022, 16:00

General

  • Target

    PO.exe

  • Size

    874KB

  • MD5

    82e39fd79e80fb9e2a5d1083db4649c2

  • SHA1

    c0f5e1212746ea51b59d77ed7b18302c5ce76bcb

  • SHA256

    735e6e491fcd3f5b9b0d678584298a2167a52b279dfc72f20ade5c48eb68587b

  • SHA512

    f1f3e30c9fdd14c4771f931703dda252f68c9da93d4bec1e288a30de11f9cfe8e426785391d0c1b9e7b2d957b6ad10162a1153aa355170cf2cca0e6638b7313b

  • SSDEEP

    12288:7xbkZK42iNC09uuRhIIVblRcDiLkR36xf8Dd4iMEpbADqjJ5nX8:7Q1Su/TNLkR3C8yMjrX

Malware Config

Extracted

Family

formbook

Campaign

r7cm

Decoy

Aqo0+xUSgri27ldyZ1IaWBPkw2TbEQ==

ZP/9kCFZzmfUkIgyoIwLGN0oyTc0W48=

P7qnLdI7nN6gDmiHlXEhWMpEO1bq

kiQwcHqHlEJGQOj4

iVggF68HUwBY9PKDvfZn3A==

85Xs9wxBf2/YbUnFHEl+fc1rAg==

fhCkZ4mlBTh3+2ZcVz9EULpn

9oQEyAM7q6Vzd1r8I22h39m/faY=

gFymGrT7TLQCkGjkIfdyvStfDA==

Tca3AVmwHVB7f+7rLdF9iMg=

P74RFbEaU4ZMMOLcH8qN

89WjqBar7bhM

hWQ2NcoNYFDNclLkKdF9iMg=

87qLiitpbJ4q4w==

67iJmOzoR/xtC4284tK91gmbTHy5HwUt

4lhAfaucExf7HQR1vfZn3A==

aTp3x97xXGz4cqgmJg==

EqafII6PyzJ99xBztYoRSW5tFQ==

vUanrfkDKfpnG1+4LpY=

i0tqsoz0DcJA

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1192
    • C:\Users\Admin\AppData\Local\Temp\PO.exe
      "C:\Users\Admin\AppData\Local\Temp\PO.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1044
      • C:\Users\Admin\AppData\Local\Temp\PO.exe
        "{path}"
        3⤵
          PID:612
        • C:\Users\Admin\AppData\Local\Temp\PO.exe
          "{path}"
          3⤵
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1668
      • C:\Windows\SysWOW64\colorcpl.exe
        "C:\Windows\SysWOW64\colorcpl.exe"
        2⤵
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1040
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1856

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • \Users\Admin\AppData\Local\Temp\sqlite3.dll

              Filesize

              810KB

              MD5

              c6ec991471d42128268ea10236d9cdb8

              SHA1

              d569350d02db6a118136220da8de40a9973084f1

              SHA256

              1b755cc3093dd45a0df857854aedfeb3c8f3622cff5bc491f2d492ebfa3ef8e0

              SHA512

              a67ed46547b9270c8a5a7a947b375cb6baf3211072f90170aae2bb6ce9c4fe9d7be3e9d782420dcfdbc19a1f232b3be561ca503b80e8dc3e036a62c54cad5b57

            • memory/1040-78-0x0000000000120000-0x000000000014D000-memory.dmp

              Filesize

              180KB

            • memory/1040-73-0x0000000000970000-0x0000000000988000-memory.dmp

              Filesize

              96KB

            • memory/1040-74-0x0000000000120000-0x000000000014D000-memory.dmp

              Filesize

              180KB

            • memory/1040-75-0x0000000001F20000-0x0000000002223000-memory.dmp

              Filesize

              3.0MB

            • memory/1040-76-0x0000000001D90000-0x0000000001E1F000-memory.dmp

              Filesize

              572KB

            • memory/1044-54-0x0000000000CC0000-0x0000000000DA0000-memory.dmp

              Filesize

              896KB

            • memory/1044-58-0x0000000000950000-0x0000000000984000-memory.dmp

              Filesize

              208KB

            • memory/1044-57-0x00000000057F0000-0x000000000587C000-memory.dmp

              Filesize

              560KB

            • memory/1044-56-0x00000000004C0000-0x00000000004E0000-memory.dmp

              Filesize

              128KB

            • memory/1044-55-0x0000000075C61000-0x0000000075C63000-memory.dmp

              Filesize

              8KB

            • memory/1192-79-0x0000000004C60000-0x0000000004D55000-memory.dmp

              Filesize

              980KB

            • memory/1192-77-0x0000000004C60000-0x0000000004D55000-memory.dmp

              Filesize

              980KB

            • memory/1192-70-0x0000000004AE0000-0x0000000004C53000-memory.dmp

              Filesize

              1.4MB

            • memory/1668-60-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/1668-69-0x00000000000E0000-0x00000000000F0000-memory.dmp

              Filesize

              64KB

            • memory/1668-68-0x0000000000940000-0x0000000000C43000-memory.dmp

              Filesize

              3.0MB

            • memory/1668-67-0x0000000000401000-0x000000000042F000-memory.dmp

              Filesize

              184KB

            • memory/1668-66-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/1668-65-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/1668-62-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/1668-59-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB