Analysis

  • max time kernel
    147s
  • max time network
    135s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2022 12:53

General

  • Target

    SecuriteInfo.com.Gen.Variant.Nemesis.2757.17275.19129.exe

  • Size

    261KB

  • MD5

    776a8a04a8b1138f49dd918ed437cc83

  • SHA1

    e0f781ae75f7289946349579a3f48d155a5f372f

  • SHA256

    da5141ac63120c792dcd641d11962804126ad650211651c27d264f18354cd2a8

  • SHA512

    3c88a85093a4fc95bd2a2e9c894933e407ab3b822e69657e5f6cc4bc87838c8aec353131d06e614cb2b9c5e743f580ed9379169a765ed368cae9e5c24e342282

  • SSDEEP

    6144:MEa0NflUKT9Imaq6e9KfScqCR0L943FrLhMtuwL4EbzoalbkgYG:XbT9ImnmacqCK43FLqCEbkalbV

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

je14

Decoy

innervisionbuildings.com

theenergysocialite.com

565548.com

panghr.com

onlyonesolutions.com

stjohnzone6.com

cnotes.rest

helfeb.online

xixi-s-inc.club

easilyentered.com

theshopx.store

mrclean-ac.com

miamibeachwateradventures.com

jpearce.co.uk

seseragi-bunkou.com

minimaddie.com

commbank-help-849c3.com

segohandelsonderneming.com

namthanhreal.com

fototerapi.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1276
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Nemesis.2757.17275.19129.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Gen.Variant.Nemesis.2757.17275.19129.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1576
      • C:\Users\Admin\AppData\Local\Temp\mswteajr.exe
        "C:\Users\Admin\AppData\Local\Temp\mswteajr.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1160
        • C:\Users\Admin\AppData\Local\Temp\mswteajr.exe
          "C:\Users\Admin\AppData\Local\Temp\mswteajr.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1712
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1572
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\mswteajr.exe"
        3⤵
          PID:1432

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\mswteajr.exe
      Filesize

      72KB

      MD5

      075a7da95f2a03eb3b6e47ed076c3ca0

      SHA1

      1e27e909c51bbd3dd7e36ad2a277c55a8e0e9720

      SHA256

      48ad1ef9c53284c357cce078a9fbde27642a9c49dd2b7bc1163c06c98d0d82c5

      SHA512

      aed0afd7379769e031f291761d5ebd974730258a38f16588b8e65bd6f4606e307f77930674ee58c18081fee454f17614d75bba29ed5e48f1c4543aa7bc274f9c

    • C:\Users\Admin\AppData\Local\Temp\mswteajr.exe
      Filesize

      72KB

      MD5

      075a7da95f2a03eb3b6e47ed076c3ca0

      SHA1

      1e27e909c51bbd3dd7e36ad2a277c55a8e0e9720

      SHA256

      48ad1ef9c53284c357cce078a9fbde27642a9c49dd2b7bc1163c06c98d0d82c5

      SHA512

      aed0afd7379769e031f291761d5ebd974730258a38f16588b8e65bd6f4606e307f77930674ee58c18081fee454f17614d75bba29ed5e48f1c4543aa7bc274f9c

    • C:\Users\Admin\AppData\Local\Temp\mswteajr.exe
      Filesize

      72KB

      MD5

      075a7da95f2a03eb3b6e47ed076c3ca0

      SHA1

      1e27e909c51bbd3dd7e36ad2a277c55a8e0e9720

      SHA256

      48ad1ef9c53284c357cce078a9fbde27642a9c49dd2b7bc1163c06c98d0d82c5

      SHA512

      aed0afd7379769e031f291761d5ebd974730258a38f16588b8e65bd6f4606e307f77930674ee58c18081fee454f17614d75bba29ed5e48f1c4543aa7bc274f9c

    • C:\Users\Admin\AppData\Local\Temp\vdotqyrlt.gb
      Filesize

      185KB

      MD5

      25682a4159819c4c0702c797897ccddb

      SHA1

      5cf8a2d77b7ecd2e1d7caa708d67285985485adc

      SHA256

      d68a7b5abcbf7b81772c7ed9d606f568cfa4f85beba98be01a8e63cd9629fca8

      SHA512

      d392e357629dff638a1119f41e14d10664597805112698ff62cb560ba2ab4ebf266cc0073eeaabe9254dcebe9e4ea54d3cdb625650407b09b506860f4f860911

    • C:\Users\Admin\AppData\Local\Temp\zqgzc.xug
      Filesize

      5KB

      MD5

      1e975cc580e4b281f9e1cdad0c03fa60

      SHA1

      88add23dd2ba2e0711d27ba90c15abbd6ffb381c

      SHA256

      ed9443599ce57c069f481b8ea450c473d1532e5a0da3cc7d3b3bc0fe8ee09671

      SHA512

      1e398499c67196e734f1cccf89951f24d304a2ae5aa848cfa38dfe5cc6c07600194a95646691110a55927eaaba32dfcb7dffb5c1afcd41645db253cecc31110a

    • \Users\Admin\AppData\Local\Temp\mswteajr.exe
      Filesize

      72KB

      MD5

      075a7da95f2a03eb3b6e47ed076c3ca0

      SHA1

      1e27e909c51bbd3dd7e36ad2a277c55a8e0e9720

      SHA256

      48ad1ef9c53284c357cce078a9fbde27642a9c49dd2b7bc1163c06c98d0d82c5

      SHA512

      aed0afd7379769e031f291761d5ebd974730258a38f16588b8e65bd6f4606e307f77930674ee58c18081fee454f17614d75bba29ed5e48f1c4543aa7bc274f9c

    • \Users\Admin\AppData\Local\Temp\mswteajr.exe
      Filesize

      72KB

      MD5

      075a7da95f2a03eb3b6e47ed076c3ca0

      SHA1

      1e27e909c51bbd3dd7e36ad2a277c55a8e0e9720

      SHA256

      48ad1ef9c53284c357cce078a9fbde27642a9c49dd2b7bc1163c06c98d0d82c5

      SHA512

      aed0afd7379769e031f291761d5ebd974730258a38f16588b8e65bd6f4606e307f77930674ee58c18081fee454f17614d75bba29ed5e48f1c4543aa7bc274f9c

    • memory/1160-56-0x0000000000000000-mapping.dmp
    • memory/1276-67-0x00000000041D0000-0x00000000042AC000-memory.dmp
      Filesize

      880KB

    • memory/1276-77-0x0000000006AD0000-0x0000000006C45000-memory.dmp
      Filesize

      1.5MB

    • memory/1276-75-0x0000000006AD0000-0x0000000006C45000-memory.dmp
      Filesize

      1.5MB

    • memory/1432-72-0x0000000000000000-mapping.dmp
    • memory/1572-70-0x0000000000B80000-0x0000000000B9C000-memory.dmp
      Filesize

      112KB

    • memory/1572-68-0x0000000000000000-mapping.dmp
    • memory/1572-71-0x0000000000080000-0x00000000000AF000-memory.dmp
      Filesize

      188KB

    • memory/1572-73-0x0000000001FA0000-0x00000000022A3000-memory.dmp
      Filesize

      3.0MB

    • memory/1572-74-0x0000000000900000-0x0000000000993000-memory.dmp
      Filesize

      588KB

    • memory/1572-76-0x0000000000080000-0x00000000000AF000-memory.dmp
      Filesize

      188KB

    • memory/1576-54-0x0000000075B11000-0x0000000075B13000-memory.dmp
      Filesize

      8KB

    • memory/1712-66-0x00000000002B0000-0x00000000002C4000-memory.dmp
      Filesize

      80KB

    • memory/1712-65-0x0000000000AE0000-0x0000000000DE3000-memory.dmp
      Filesize

      3.0MB

    • memory/1712-64-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1712-62-0x000000000041F120-mapping.dmp