Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    26-10-2022 03:19

General

  • Target

    DOC21AZ068G2022.exe

  • Size

    258KB

  • MD5

    868608b7e90e467edba786effe32dfea

  • SHA1

    6de62b0cd19ddaad25b80ced29d35d80410d1ca4

  • SHA256

    5644b2a6b24189d3ffd6e90413150e01dc160e33a062e158f0ef50e0bd02e310

  • SHA512

    c5e76faaafb27d519933f50c3d3961943c29fe3c7e59b125a5fd08eec7f6acdcfbc4071661dae1d2b63216b9a417f2fdc9c674ac03a20ba05a17a1b4e5f34100

  • SSDEEP

    6144:mbE/HUbk4BzCq3T0yLj6tV/SnSUp36J6fPy0nqFm:mb/xPz/nN188lnqc

Malware Config

Extracted

Family

formbook

Campaign

axe3

Decoy

nV63ydJMXMf7memspIpnnVLl3Q==

uJ50rs5Y/80AqT79guHh

FcsTFQ1xekTgcal8G0P2ZTQ=

uLWWVJP++ID3dkoB8g==

YyoybGF5Fsa/UH8=

Tk4htwkBBfM5ZA==

QgJ8vN9f+uCdsD79guHh

wmjC9UuSBGyTrY5PAX9t1A==

Sw7JEwOKl576ndxw/A==

BOqs09Ikjej1BN98ZYtVfSi5xQ==

YA5cbH3/4wVAYg==

fRWIvatAXM3+t0X9guHh

FAbZXq/jFuaEq2YCwQh3b2oE

STL+RDTA652/tD/9guHh

zgLNcuX32aFB

WmgwW1UCJ/9Nc0ofkIhVyQ==

jiWgy9ckGh8G+3Q7Rl//NW9ZU7TU

JCoawiBkwAkeJOehkNXRCYnj3A==

WQDFZvang91P

zGrJ4CA2pAhR

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Blocklisted process makes network request 3 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 4 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1404
    • C:\Users\Admin\AppData\Local\Temp\DOC21AZ068G2022.exe
      "C:\Users\Admin\AppData\Local\Temp\DOC21AZ068G2022.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1972
      • C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe
        "C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1960
        • C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe
          "C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1232
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1696
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1040

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\kfmbi.pra

      Filesize

      4KB

      MD5

      25cea2a583f9c4768e3e55ee7130fca3

      SHA1

      fbef27d48e1f1df3aceafa7bfc6fed017af34d03

      SHA256

      3f533a2e2a0308a48c692ba58f98a6e91a54d17f81a47d8b27bc574dc91fe425

      SHA512

      c689c35da39dc041fad1d5a722cd3ea669cfed88f6d4f4a4bb796eed4a46fcf40acd15c1c0c9357c26879d90c5bfb16f144a48fec738c73bd9f3ecd36af6daf8

    • C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe

      Filesize

      58KB

      MD5

      46a32c2792387aba9d462423bc915bf8

      SHA1

      822e7dd38745e2067b73e45f0191ca07993f97dd

      SHA256

      ca6528e4c2b191efdec435f8769e90e1971c4853f32d5e311bae536efd77ff8d

      SHA512

      8943051f195be5bb72c4ec30cba3871fec1bdeecc66b7a326e699e63f379a7add1be5eaf70b408a76638a8d2756b6f0d9f112eb1addc22de2f92ffe74f8472a8

    • C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe

      Filesize

      58KB

      MD5

      46a32c2792387aba9d462423bc915bf8

      SHA1

      822e7dd38745e2067b73e45f0191ca07993f97dd

      SHA256

      ca6528e4c2b191efdec435f8769e90e1971c4853f32d5e311bae536efd77ff8d

      SHA512

      8943051f195be5bb72c4ec30cba3871fec1bdeecc66b7a326e699e63f379a7add1be5eaf70b408a76638a8d2756b6f0d9f112eb1addc22de2f92ffe74f8472a8

    • C:\Users\Admin\AppData\Local\Temp\mubeskgb.exe

      Filesize

      58KB

      MD5

      46a32c2792387aba9d462423bc915bf8

      SHA1

      822e7dd38745e2067b73e45f0191ca07993f97dd

      SHA256

      ca6528e4c2b191efdec435f8769e90e1971c4853f32d5e311bae536efd77ff8d

      SHA512

      8943051f195be5bb72c4ec30cba3871fec1bdeecc66b7a326e699e63f379a7add1be5eaf70b408a76638a8d2756b6f0d9f112eb1addc22de2f92ffe74f8472a8

    • C:\Users\Admin\AppData\Local\Temp\yarxmpokn.h

      Filesize

      185KB

      MD5

      cffe7517a3ad697a7cc36424aafa46fa

      SHA1

      f07c60e6186e1d997f62c7938a6b59e3576541a2

      SHA256

      8e2bade6c04ea25c2c66277df95251e796c86efbd0326424c19eee987ee40f98

      SHA512

      cdef97834dc265ccc13bfae58c110cd1c38537e245baf2878ad954b583164b088da8146c5e1cec15c4b2265fe8e0f200bc9e9ae25a6b445f7417114179b6db08

    • \Users\Admin\AppData\Local\Temp\mubeskgb.exe

      Filesize

      58KB

      MD5

      46a32c2792387aba9d462423bc915bf8

      SHA1

      822e7dd38745e2067b73e45f0191ca07993f97dd

      SHA256

      ca6528e4c2b191efdec435f8769e90e1971c4853f32d5e311bae536efd77ff8d

      SHA512

      8943051f195be5bb72c4ec30cba3871fec1bdeecc66b7a326e699e63f379a7add1be5eaf70b408a76638a8d2756b6f0d9f112eb1addc22de2f92ffe74f8472a8

    • \Users\Admin\AppData\Local\Temp\mubeskgb.exe

      Filesize

      58KB

      MD5

      46a32c2792387aba9d462423bc915bf8

      SHA1

      822e7dd38745e2067b73e45f0191ca07993f97dd

      SHA256

      ca6528e4c2b191efdec435f8769e90e1971c4853f32d5e311bae536efd77ff8d

      SHA512

      8943051f195be5bb72c4ec30cba3871fec1bdeecc66b7a326e699e63f379a7add1be5eaf70b408a76638a8d2756b6f0d9f112eb1addc22de2f92ffe74f8472a8

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      832KB

      MD5

      07fb6d31f37fb1b4164bef301306c288

      SHA1

      4cb41af6d63a07324ef6b18b1a1f43ce94e25626

      SHA256

      06ddf0a370af00d994824605a8e1307ba138f89b2d864539f0d19e8804edac02

      SHA512

      cab4a7c5805b80851aba5f2c9b001fabc1416f6648d891f49eacc81fe79287c5baa01306a42298da722750b812a4ea85388ffae9200dcf656dd1d5b5b9323353

    • memory/1232-64-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1232-62-0x00000000004012B0-mapping.dmp

    • memory/1232-65-0x0000000000920000-0x0000000000C23000-memory.dmp

      Filesize

      3.0MB

    • memory/1232-66-0x0000000000160000-0x0000000000170000-memory.dmp

      Filesize

      64KB

    • memory/1404-76-0x0000000006420000-0x0000000006544000-memory.dmp

      Filesize

      1.1MB

    • memory/1404-67-0x0000000004C70000-0x0000000004D6A000-memory.dmp

      Filesize

      1000KB

    • memory/1404-74-0x0000000006420000-0x0000000006544000-memory.dmp

      Filesize

      1.1MB

    • memory/1696-71-0x00000000000D0000-0x00000000000FD000-memory.dmp

      Filesize

      180KB

    • memory/1696-70-0x0000000000E50000-0x0000000000E68000-memory.dmp

      Filesize

      96KB

    • memory/1696-72-0x0000000000A40000-0x0000000000D43000-memory.dmp

      Filesize

      3.0MB

    • memory/1696-73-0x0000000000800000-0x000000000088F000-memory.dmp

      Filesize

      572KB

    • memory/1696-68-0x0000000000000000-mapping.dmp

    • memory/1696-75-0x00000000000D0000-0x00000000000FD000-memory.dmp

      Filesize

      180KB

    • memory/1960-56-0x0000000000000000-mapping.dmp

    • memory/1972-54-0x00000000756B1000-0x00000000756B3000-memory.dmp

      Filesize

      8KB