Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18-11-2022 22:42

General

  • Target

    IyEXXDHLEU4cBtq.exe

  • Size

    721KB

  • MD5

    0dd734598701e5ba50d5596a42b8d94c

  • SHA1

    d6cf2163dd892eb8c5e274856c61e9f90b03d1d9

  • SHA256

    501d6ddc2677cf909cdf85570bfbf09099004a108236bb25954758387f080b9f

  • SHA512

    d22bf5d34170f274883346349b3093d90d15a5769e9d6a1a7fb75e6230b9bce373af1f7601d40c19aa34551bbcbc08170cae464651525bdc02d418efd378c745

  • SSDEEP

    12288:yxBnM33302IgFJN0V3foFtswOSf5nHoHY8up3wxb4xZ2cbTEcjZnbCkI:YBnG30YComSxEY8gwxED2SBjZnbCkI

Malware Config

Extracted

Family

formbook

Campaign

bmr1

Decoy

q05YNsJC4MpYLGAf4A==

6KUzKCvwX0fwzrFQXvlucw==

KA4ZibW1w+hWN5Q=

TfgNq18tIWtsM7h+DexncQ==

zspNqjUKBdJVHTkiMMXJYeF7G53bVvMPoA==

hopQr+b8KzPIbMWvw0Yxir6cyw==

2thmt+17FR/MVsakbM/+w3xGOhopJw==

5gO5gfA6jwna/4FNSPqrvvHyr2A=

kqtr0wr9KaOXVMyDDexncQ==

PNldyz0Boa5cLGAf4A==

Gysor7fqabd0UzTwWp3Zir6cyw==

pMRgV18gtLorB21prX4=

ukpf+vu2u+hWN5Q=

pcS/rO+KmPMj69G9cMHnoSEm59cbIQ==

4fWGzv347bFNDYJeeIHKG5co

WXlRyM2Yn+4Ab1EgRAFHWdGDCzf1

ZPoM+2U1cwMzteOBsHY=

o8jQoNron4sT3A/KomE=

7QX8tTpv/A+YKw==

wFvmV8SY/A+YKw==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Users\Admin\AppData\Local\Temp\IyEXXDHLEU4cBtq.exe
      "C:\Users\Admin\AppData\Local\Temp\IyEXXDHLEU4cBtq.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4976
      • C:\Users\Admin\AppData\Local\Temp\IyEXXDHLEU4cBtq.exe
        "C:\Users\Admin\AppData\Local\Temp\IyEXXDHLEU4cBtq.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1236
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:3464

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1236-143-0x0000000000FA0000-0x00000000012EA000-memory.dmp
      Filesize

      3.3MB

    • memory/1236-140-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1236-142-0x0000000000401000-0x000000000042F000-memory.dmp
      Filesize

      184KB

    • memory/1236-141-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1236-144-0x00000000009E0000-0x00000000009F0000-memory.dmp
      Filesize

      64KB

    • memory/1236-137-0x0000000000000000-mapping.dmp
    • memory/1236-138-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1440-149-0x0000000002CD0000-0x000000000301A000-memory.dmp
      Filesize

      3.3MB

    • memory/1440-150-0x0000000002BB0000-0x0000000002C3F000-memory.dmp
      Filesize

      572KB

    • memory/1440-151-0x0000000000B70000-0x0000000000B9D000-memory.dmp
      Filesize

      180KB

    • memory/1440-147-0x0000000000530000-0x0000000000557000-memory.dmp
      Filesize

      156KB

    • memory/1440-148-0x0000000000B70000-0x0000000000B9D000-memory.dmp
      Filesize

      180KB

    • memory/1440-146-0x0000000000000000-mapping.dmp
    • memory/2340-145-0x00000000031E0000-0x00000000032B6000-memory.dmp
      Filesize

      856KB

    • memory/2340-152-0x0000000008A30000-0x0000000008B43000-memory.dmp
      Filesize

      1.1MB

    • memory/2340-153-0x0000000008A30000-0x0000000008B43000-memory.dmp
      Filesize

      1.1MB

    • memory/4976-135-0x0000000005710000-0x000000000571A000-memory.dmp
      Filesize

      40KB

    • memory/4976-136-0x00000000079C0000-0x0000000007A5C000-memory.dmp
      Filesize

      624KB

    • memory/4976-134-0x0000000005660000-0x00000000056F2000-memory.dmp
      Filesize

      584KB

    • memory/4976-133-0x0000000005D70000-0x0000000006314000-memory.dmp
      Filesize

      5.6MB

    • memory/4976-132-0x0000000000C20000-0x0000000000CDA000-memory.dmp
      Filesize

      744KB