Analysis

  • max time kernel
    299s
  • max time network
    291s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2022, 08:12

General

  • Target

    Roominglist.exe

  • Size

    56KB

  • MD5

    33cb940f9ffa1caaf6e4bfbe34f20ace

  • SHA1

    1feeae415133b70c095a6403620f498b4eeb48c1

  • SHA256

    6c1aa92f10b53b678585205a87e2a64daab99b685f97955582f89f89743048fd

  • SHA512

    da25ba7d05fb283cb5eb8047afc68f626aa6876ae7a64d3f93b6460ec0483c57f682468e7852254b4e8dced65774d956cd91ffff1b19a4764eadd434e078dfb1

  • SSDEEP

    1536:20ipga/eHUTQQQQQQQBdBgN6b5/2kWSC6WLr4HDvas:9ipga/eHUTQQQQQQkdBft/2YWLr4HDys

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ee05

Decoy

xn--ekro31fyrpxa.xn--55qx5d

gxttgfjj.buzz

lojaoutletbuscape.com

xianhewan.net

courtreporter.news

yzjhxly.com

mammaminimalista.com

oilfieldoriginals.net

sxptraining.com

balajicracker.com

womeninfinance101.website

yourcustomclothes.store

22487.site

zxznkjgs.com

devonbikeshack.bike

supratechnologyinc.com

ganbun.click

ronstarow.shop

sanderborst.space

cyberlabisc.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 6 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 51 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\Roominglist.exe
      "C:\Users\Admin\AppData\Local\Temp\Roominglist.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1760
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1652
        • C:\Windows\SysWOW64\wininit.exe
          "C:\Windows\SysWOW64\wininit.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1460
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\aspnet_compiler.exe"
            5⤵
              PID:1488

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1260-66-0x0000000002C60000-0x0000000002D13000-memory.dmp

      Filesize

      716KB

    • memory/1260-79-0x0000000006850000-0x0000000006975000-memory.dmp

      Filesize

      1.1MB

    • memory/1260-77-0x0000000006850000-0x0000000006975000-memory.dmp

      Filesize

      1.1MB

    • memory/1260-69-0x0000000006C90000-0x0000000006E3A000-memory.dmp

      Filesize

      1.7MB

    • memory/1460-78-0x00000000000A0000-0x00000000000CF000-memory.dmp

      Filesize

      188KB

    • memory/1460-76-0x0000000001D90000-0x0000000001E23000-memory.dmp

      Filesize

      588KB

    • memory/1460-75-0x00000000000A0000-0x00000000000CF000-memory.dmp

      Filesize

      188KB

    • memory/1460-74-0x0000000002060000-0x0000000002363000-memory.dmp

      Filesize

      3.0MB

    • memory/1460-73-0x0000000000080000-0x000000000009A000-memory.dmp

      Filesize

      104KB

    • memory/1652-68-0x00000000002A0000-0x00000000002B4000-memory.dmp

      Filesize

      80KB

    • memory/1652-65-0x0000000000260000-0x0000000000274000-memory.dmp

      Filesize

      80KB

    • memory/1652-71-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1652-64-0x00000000009F0000-0x0000000000CF3000-memory.dmp

      Filesize

      3.0MB

    • memory/1652-63-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1652-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1652-58-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1652-57-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1760-54-0x0000000001230000-0x0000000001240000-memory.dmp

      Filesize

      64KB

    • memory/1760-56-0x0000000000440000-0x0000000000450000-memory.dmp

      Filesize

      64KB

    • memory/1760-55-0x0000000075C51000-0x0000000075C53000-memory.dmp

      Filesize

      8KB