Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/10/2022, 06:56

General

  • Target

    img1910202258454857453739.exe

  • Size

    279KB

  • MD5

    ea4887c59777688d1eefd6611710224d

  • SHA1

    b4fd3fc6792f3d724bc17b235a14b459de0fb85a

  • SHA256

    9fd8b0f6c9167d26074c6b95b7cab23af2ac512f4dcdd8486309f489e8953e8f

  • SHA512

    081050a2aa2ae52d51ccff4bf7eb289998a5bf660df45e6fdd7c075383ecdd575ae7fc1c31b7beecbef745d4cbf974bb69977da9f0b7f17a38af6046bd356059

  • SSDEEP

    6144:81bn6zIMq4u2CorAIVvAGIVoozfRg4KAil0jRdEcc3imi44z4+uemsARMYg:k6zRqerAEvXgLRwIjIy30+jmsAWYg

Malware Config

Extracted

Family

formbook

Campaign

obc0

Decoy

A2gNIt4ZLE2WSRNqwwwpsBTT

KLiJs2j/oYJGXw==

GJ5AX02Bzirgole5H/xkbHxxxA==

nhGtQ1jESNk=

M/qrQ6/c8BjOhjUShQwpsBTT

hhjW6ZLD3W5/YSvc/w==

ck6CCdkGHGLCJeYHfoHi2jLrLkMI

M7hs+yxb421IZmQ4g0Y=

P/gftL3tjcgy1JT+Z0g=

v5xRZ1+PJTeGLQRDdVE=

IpZE4CpJa7qSObgbNNO0sAjey1PTVw==

CuMGreIQqVLMeVneRCnVh9LE

5Ig0zy1q8hFYwLGX9w==

wYxI1zZk7juqENdahFM=

8W4jMcvt8hKaBK3UNzfVh9LE

xVQHn+gbtydXi1mU

V9Z5FkCyPN0=

B8RxDECyPN0=

6u4Rp7nkvaoVsRo=

Efs21e4nxg8bux4=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 56 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    PID:968
    • C:\Users\Admin\AppData\Local\Temp\img1910202258454857453739.exe
      "C:\Users\Admin\AppData\Local\Temp\img1910202258454857453739.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:2524
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4732
        • C:\Windows\SysWOW64\systray.exe
          "C:\Windows\SysWOW64\systray.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:5100
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            5⤵
              PID:3152
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:1900

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/968-142-0x0000000002840000-0x0000000002934000-memory.dmp

              Filesize

              976KB

            • memory/968-158-0x0000000007280000-0x0000000007343000-memory.dmp

              Filesize

              780KB

            • memory/968-156-0x0000000007280000-0x0000000007343000-memory.dmp

              Filesize

              780KB

            • memory/968-148-0x0000000007D30000-0x0000000007E90000-memory.dmp

              Filesize

              1.4MB

            • memory/968-145-0x0000000002840000-0x0000000002934000-memory.dmp

              Filesize

              976KB

            • memory/2524-136-0x00007FFE992A0000-0x00007FFE99D61000-memory.dmp

              Filesize

              10.8MB

            • memory/2524-132-0x0000000000700000-0x000000000074A000-memory.dmp

              Filesize

              296KB

            • memory/2524-143-0x00007FFE992A0000-0x00007FFE99D61000-memory.dmp

              Filesize

              10.8MB

            • memory/4732-139-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4732-151-0x0000000000401000-0x000000000042F000-memory.dmp

              Filesize

              184KB

            • memory/4732-140-0x0000000000DF0000-0x000000000113A000-memory.dmp

              Filesize

              3.3MB

            • memory/4732-144-0x0000000000401000-0x000000000042F000-memory.dmp

              Filesize

              184KB

            • memory/4732-138-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4732-147-0x0000000001160000-0x0000000001170000-memory.dmp

              Filesize

              64KB

            • memory/4732-137-0x0000000000401000-0x000000000042F000-memory.dmp

              Filesize

              184KB

            • memory/4732-133-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4732-150-0x0000000000400000-0x000000000042F000-memory.dmp

              Filesize

              188KB

            • memory/4732-141-0x0000000000DB0000-0x0000000000DC0000-memory.dmp

              Filesize

              64KB

            • memory/5100-153-0x00000000005C0000-0x00000000005ED000-memory.dmp

              Filesize

              180KB

            • memory/5100-154-0x0000000002740000-0x0000000002A8A000-memory.dmp

              Filesize

              3.3MB

            • memory/5100-155-0x00000000024E0000-0x000000000256F000-memory.dmp

              Filesize

              572KB

            • memory/5100-152-0x00000000009E0000-0x00000000009E6000-memory.dmp

              Filesize

              24KB

            • memory/5100-157-0x00000000005C0000-0x00000000005ED000-memory.dmp

              Filesize

              180KB