Analysis

  • max time kernel
    155s
  • max time network
    159s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/10/2022, 07:27

General

  • Target

    Sales Receipt.exe

  • Size

    1.0MB

  • MD5

    2a22e7d53faded181496ea4f181ffee0

  • SHA1

    e185bfc39c1ac2633edbdb7ae2f9b3b9816aa11f

  • SHA256

    24e086c1829385f3822044c7cdb533ba2f038cba1e088314b8f327f1e4616a75

  • SHA512

    020306856b39f2b404fe0c55146f7ef536d03d820b21954e2bad958a78233ee49f693e6745d70150824ee8d2e52654b195a3571a49eddf17cad4d62d5a2df070

  • SSDEEP

    12288:p3w+fwM6nMWJzbLbYHYYr9esd30+C/qt91UwN50CdcmbEqGT9KPva2GCqM:pgCqnJzbLbYHYYrHeMt91UwXPiToKZM

Malware Config

Extracted

Family

formbook

Campaign

t0uu

Decoy

5qf0rEhPb4XZWXWEeURMYdG0c9s=

O8SURu/l0MHyf0tJUvLv7/WeRZXa

kZFzJB1AQJ3u0Fz27XTVZwM/RkGYzg==

MDw73V1hMFIUBiQdlBeaxgH6

fkX6oKn0/KQs1hUtH+WPrlg=

oVfkjYXcrlc=

YCJK+qt7C69/cnU4

EQtrDR+oQ4ELH24Gydpl2g==

u6tyBpCHeEwQymzoyF/lJ/1XQcpxdKpG

4tWPLz2FXGjxpkbh6A==

JBa40XxOrAHM

CMHznifqehEi2+C0WCAkjnG/na/Y

jDVN5WoRlvV/cnU4

nJu0YQw28gJM0psiKd4/nxUms+AYgEs=

lHU12ew9HDMtGHwC8w==

SEy8YF/WbgHV2IwI9w==

nFqQTQAk3fGvbmMXvotnsZgu6gl9xA==

kD7Pf5IhdrN/cnU4

Mje0add7KHqYjq9xOBMFbWS/na/Y

FMU92tVWrscB7HkLBYzobhHIVtE=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:376
    • C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe
      "C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe
        "C:\Users\Admin\AppData\Local\Temp\Sales Receipt.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1876
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3416
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:836

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/376-146-0x0000000002800000-0x00000000028F3000-memory.dmp

      Filesize

      972KB

    • memory/376-156-0x0000000008170000-0x00000000082D3000-memory.dmp

      Filesize

      1.4MB

    • memory/376-154-0x0000000008170000-0x00000000082D3000-memory.dmp

      Filesize

      1.4MB

    • memory/1876-149-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/1876-145-0x00000000014F0000-0x0000000001500000-memory.dmp

      Filesize

      64KB

    • memory/1876-148-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1876-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1876-141-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1876-142-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/1876-144-0x0000000001550000-0x000000000189A000-memory.dmp

      Filesize

      3.3MB

    • memory/3416-151-0x0000000000D20000-0x0000000000D4D000-memory.dmp

      Filesize

      180KB

    • memory/3416-150-0x00000000004B0000-0x00000000004BB000-memory.dmp

      Filesize

      44KB

    • memory/3416-152-0x00000000016C0000-0x0000000001A0A000-memory.dmp

      Filesize

      3.3MB

    • memory/3416-153-0x0000000001580000-0x000000000160F000-memory.dmp

      Filesize

      572KB

    • memory/3416-155-0x0000000000D20000-0x0000000000D4D000-memory.dmp

      Filesize

      180KB

    • memory/5072-135-0x0000000004D90000-0x0000000004D9A000-memory.dmp

      Filesize

      40KB

    • memory/5072-137-0x0000000009D10000-0x0000000009D76000-memory.dmp

      Filesize

      408KB

    • memory/5072-132-0x0000000000300000-0x0000000000410000-memory.dmp

      Filesize

      1.1MB

    • memory/5072-136-0x0000000009B70000-0x0000000009C0C000-memory.dmp

      Filesize

      624KB

    • memory/5072-134-0x0000000004E40000-0x0000000004ED2000-memory.dmp

      Filesize

      584KB

    • memory/5072-133-0x00000000053F0000-0x0000000005994000-memory.dmp

      Filesize

      5.6MB