Analysis

  • max time kernel
    62s
  • max time network
    42s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10/10/2022, 11:00

General

  • Target

    cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe

  • Size

    832KB

  • MD5

    488a92e53724b14f114bf642ef01a598

  • SHA1

    4ade82db0e3762a754df784e1174741776b77b79

  • SHA256

    cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0

  • SHA512

    c7b37e61fc3604c3079725c48e437cb2128fabf0ad13fd6b6a2163def410c6f56461457cbfe811ba22ffdf393228dc5cd13ba6c36a58ad3daada6d1d5bad33af

  • SSDEEP

    12288:Of5dQ0pNedvv+JlebXrI1/J+YDQ4XXA0BOp9DIXZzRb:Of56AoWke+H4XwaO8X

Malware Config

Extracted

Family

formbook

Campaign

8awd

Decoy

py09MqOp96q6/h3QscX4tW3iC7Zc

Tz1RED2uEMHX5bExDz09Jqi/Dp0H80+R

8zT8gjNx3p7wuIME

ZPsM5CNczTg0hpxQMjVpXNviC7Zc

+5mhjcAHMLXwuIME

SlXLkzt83EG+XgMB

49P3teQlh8kXa0EBktUPoJ1H

BX4jXQd5qd4zzA==

6oy60lNViBATLADLf5md

2fFyLfZggXpyxA==

UBko+iEvcbAMyMliSy08HRT1udo=

uVl5kv1HcfxOn10=

NdJzr7kWDsC/

LoQwD70XbJ2y3qZcI8rHtHniC7Zc

SdTk6XN+x36YxLqqX1CdcQ==

bshYGLil02pvusAUqm2ndw==

eP8PQhhsCPs00FjNsIOpWxT1udo=

Ya5AGLWc4IbcVpnLf5md

Q8G/i732kjY+XpzLf5md

ioWvTFWx9KLwuIME

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe
    "C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\mWXyHZOFFcR.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1180
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\mWXyHZOFFcR" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2C11.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1272
    • C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe
      "C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"
      2⤵
        PID:896
      • C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe
        "C:\Users\Admin\AppData\Local\Temp\cd5d9b007cb1b71e7c70071c5f8ca17d4a994cdedbeae383de55345cceec10c0.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        PID:1812

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp2C11.tmp

      Filesize

      1KB

      MD5

      a7ef20476056ed45f36278c164bcbe6e

      SHA1

      70eaba8c9f0c97284b43be8ac6ffc04a1a798678

      SHA256

      449f04c504a3d516ed428cacf767ea9b80c89c255fc10c9346e79c38814b882a

      SHA512

      9fc5b2e9dc0591d8c85d96d095699db2fb1e5eb77d65f1fcfedaf978914d90697c1fa988fa92126284a005d6b17946aad3347402ef8c4834c8d07eb4171e2cc4

    • memory/1180-74-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1180-73-0x0000000074120000-0x00000000746CB000-memory.dmp

      Filesize

      5.7MB

    • memory/1628-63-0x00000000023E0000-0x0000000002414000-memory.dmp

      Filesize

      208KB

    • memory/1628-58-0x0000000005F80000-0x000000000600E000-memory.dmp

      Filesize

      568KB

    • memory/1628-57-0x00000000007E0000-0x00000000007EC000-memory.dmp

      Filesize

      48KB

    • memory/1628-54-0x0000000000140000-0x0000000000216000-memory.dmp

      Filesize

      856KB

    • memory/1628-56-0x00000000007D0000-0x00000000007E6000-memory.dmp

      Filesize

      88KB

    • memory/1628-55-0x00000000754E1000-0x00000000754E3000-memory.dmp

      Filesize

      8KB

    • memory/1812-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1812-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1812-67-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1812-70-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1812-71-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/1812-72-0x00000000009C0000-0x0000000000CC3000-memory.dmp

      Filesize

      3.0MB