Analysis

  • max time kernel
    157s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02/11/2022, 01:33

General

  • Target

    c352208b986b71d83fdc059413c236f0.exe

  • Size

    215KB

  • MD5

    c352208b986b71d83fdc059413c236f0

  • SHA1

    24e6775ed6e4beb4235cc0604d6627a055aefbc1

  • SHA256

    cbce721b186a5ebb1a2c51249571d8021cc67c019a0cfbc0cef73fd1de48708e

  • SHA512

    0928857e3fcc4addb2787a9bc2ff99f1287e5e8d958d180adf6cb6c619571b54e551e51d1668aa68e3eda1beb3b887dd95b3a4dbad2d933d25d100db8370521a

  • SSDEEP

    6144:qweEpws+7aOJr52ZvqBHtT69I83TEKX6eorwr:bwz71FIAB83TGeoMr

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b47h

Decoy

whistleblow-now.com

14live-msa.one

yenitedarikciniz.xyz

marmargoods.com

full-funs.com

saoraigne.com

noemiaguesthouse.space

datatobe.community

sollight.net

wavestudios.pro

freeorama.com

fasinixiaoribenguizi032.com

mariajaq.com

hyper.vote

aedin.dev

docind.com

zhulinx.com

estairon.best

mlnphotography.art

1948ardithdr.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2724
    • C:\Users\Admin\AppData\Local\Temp\c352208b986b71d83fdc059413c236f0.exe
      "C:\Users\Admin\AppData\Local\Temp\c352208b986b71d83fdc059413c236f0.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5092
      • C:\Users\Admin\AppData\Local\Temp\slwigr.exe
        "C:\Users\Admin\AppData\Local\Temp\slwigr.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4356
        • C:\Users\Admin\AppData\Local\Temp\slwigr.exe
          "C:\Users\Admin\AppData\Local\Temp\slwigr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4072
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2256
      • C:\Windows\SysWOW64\cmd.exe
        /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
        3⤵
          PID:4352
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:4900

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\DB1

        Filesize

        40KB

        MD5

        b608d407fc15adea97c26936bc6f03f6

        SHA1

        953e7420801c76393902c0d6bb56148947e41571

        SHA256

        b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

        SHA512

        cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

      • C:\Users\Admin\AppData\Local\Temp\jyntwnnbg.tic

        Filesize

        185KB

        MD5

        392149410e737c3f0b1d7ec2cc250625

        SHA1

        5b739338c9ba1f019ba158cc144d614c71ff9251

        SHA256

        c9552ea638c91729b6ebfbd99ccf5d03acb048ebe9dc5c55cc957608905c8175

        SHA512

        0299af4a68f2eb88eab6c015c68f9a09ebfacb877307fea7be335265dc3297c0ddb3be38c4f45607cdf2098801f16481daabcb6aa2c08d7803e91fa6bea6ebf5

      • C:\Users\Admin\AppData\Local\Temp\rfzomyb.yyw

        Filesize

        7KB

        MD5

        f666a316b6dffb0d68449328d0018351

        SHA1

        e7853f1528eaa01501bfbfdfe75efa5a61a0f91f

        SHA256

        02ce30a2d8bd22d09630179405fe1fe0a26b7c3e50a788130c3e7b19c6d89962

        SHA512

        f022a2fda6718cdfb13afc0dc76fa622dfc757ebaf09bd3b6eeb97aaa748ebeb9074e7881c4e12991be48f4ceaf1329870acdb532a2fcf95dd126e0fecf5cbea

      • C:\Users\Admin\AppData\Local\Temp\slwigr.exe

        Filesize

        6KB

        MD5

        a9d03f0a81f6308e5beba531e70c8e1c

        SHA1

        43ae43ab0d4feace10ae8947654db4197fd474b4

        SHA256

        f02d67020df9fa4312f397b3195ddeddf787d0143aef88f41d857513e54e4d7d

        SHA512

        906aa4697192c9cdee2d9051e85788968cb7338b6822a93fe250e063e85b49949201a862bc87129919b68f86228a066179e849119888f790c1bab032dd7390a5

      • C:\Users\Admin\AppData\Local\Temp\slwigr.exe

        Filesize

        6KB

        MD5

        a9d03f0a81f6308e5beba531e70c8e1c

        SHA1

        43ae43ab0d4feace10ae8947654db4197fd474b4

        SHA256

        f02d67020df9fa4312f397b3195ddeddf787d0143aef88f41d857513e54e4d7d

        SHA512

        906aa4697192c9cdee2d9051e85788968cb7338b6822a93fe250e063e85b49949201a862bc87129919b68f86228a066179e849119888f790c1bab032dd7390a5

      • C:\Users\Admin\AppData\Local\Temp\slwigr.exe

        Filesize

        6KB

        MD5

        a9d03f0a81f6308e5beba531e70c8e1c

        SHA1

        43ae43ab0d4feace10ae8947654db4197fd474b4

        SHA256

        f02d67020df9fa4312f397b3195ddeddf787d0143aef88f41d857513e54e4d7d

        SHA512

        906aa4697192c9cdee2d9051e85788968cb7338b6822a93fe250e063e85b49949201a862bc87129919b68f86228a066179e849119888f790c1bab032dd7390a5

      • C:\Users\Admin\AppData\Roaming\0K4M65UF\0K4logim.jpeg

        Filesize

        73KB

        MD5

        8c75a53d3e024daeb1ce2610b4addc4b

        SHA1

        38a0f4fd05a54e4cfc201498727b61311f9b2f54

        SHA256

        02e3c67d150cc69526c5922de52e59fe63bdb34bfb10fb16862b7474da2fc457

        SHA512

        16fff1d92a0cdb63d84b947d5370ae56bba9217f191e81908d414671ba43b82edd7be8caac7e22901ed820eb007b6550b7b07f7e64da41bebb14b6a7191d7362

      • C:\Users\Admin\AppData\Roaming\0K4M65UF\0K4logrf.ini

        Filesize

        40B

        MD5

        2f245469795b865bdd1b956c23d7893d

        SHA1

        6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

        SHA256

        1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

        SHA512

        909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

      • C:\Users\Admin\AppData\Roaming\0K4M65UF\0K4logrg.ini

        Filesize

        38B

        MD5

        4aadf49fed30e4c9b3fe4a3dd6445ebe

        SHA1

        1e332822167c6f351b99615eada2c30a538ff037

        SHA256

        75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

        SHA512

        eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

      • C:\Users\Admin\AppData\Roaming\0K4M65UF\0K4logri.ini

        Filesize

        40B

        MD5

        d63a82e5d81e02e399090af26db0b9cb

        SHA1

        91d0014c8f54743bba141fd60c9d963f869d76c9

        SHA256

        eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

        SHA512

        38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

      • C:\Users\Admin\AppData\Roaming\0K4M65UF\0K4logrv.ini

        Filesize

        872B

        MD5

        bbc41c78bae6c71e63cb544a6a284d94

        SHA1

        33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

        SHA256

        ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

        SHA512

        0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

      • memory/2256-145-0x0000000000E90000-0x0000000000EA9000-memory.dmp

        Filesize

        100KB

      • memory/2256-151-0x00000000023C0000-0x0000000002453000-memory.dmp

        Filesize

        588KB

      • memory/2256-146-0x00000000004F0000-0x000000000051F000-memory.dmp

        Filesize

        188KB

      • memory/2256-147-0x0000000002620000-0x000000000296A000-memory.dmp

        Filesize

        3.3MB

      • memory/2256-153-0x00000000004F0000-0x000000000051F000-memory.dmp

        Filesize

        188KB

      • memory/2724-154-0x0000000002BB0000-0x0000000002C91000-memory.dmp

        Filesize

        900KB

      • memory/2724-152-0x0000000002BB0000-0x0000000002C91000-memory.dmp

        Filesize

        900KB

      • memory/2724-150-0x0000000002840000-0x00000000029A2000-memory.dmp

        Filesize

        1.4MB

      • memory/2724-143-0x0000000002840000-0x00000000029A2000-memory.dmp

        Filesize

        1.4MB

      • memory/4072-142-0x0000000000C10000-0x0000000000C24000-memory.dmp

        Filesize

        80KB

      • memory/4072-141-0x0000000001360000-0x00000000016AA000-memory.dmp

        Filesize

        3.3MB

      • memory/4072-140-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB