Analysis

  • max time kernel
    151s
  • max time network
    178s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    22-11-2022 07:34

General

  • Target

    c5eb2e141e2889e82b551dc4804f872a59a5846aae7c4419409fd13fb94f3deb.exe

  • Size

    287KB

  • MD5

    f8c0137e86efffc94ec95f659eec812b

  • SHA1

    fddb98b0392fe58f543ad6fd80063f9bb56288dc

  • SHA256

    c5eb2e141e2889e82b551dc4804f872a59a5846aae7c4419409fd13fb94f3deb

  • SHA512

    490d3fa13e51a7ec98db96d8de9814a640820432f47c70d2c4fe1d9b1355143628f841ebbda70f8a43c070e1fe6a7093b9ea170a9ed912e02ec02d513275ecc8

  • SSDEEP

    6144:HNeZmH94iQoLW7RdTmkhXj14ZsUTKkP+Lt:HNlHQkiRd5juZpGQs

Malware Config

Extracted

Family

formbook

Campaign

tsuz

Decoy

7xznvXjpgziXgKV2gqDW

v7D1tLx/XXVj4TTJXNA=

Kksd/nV8o/fgptkq+1ql6A==

vJOH8u8W1nXX

iJ+tj7iKjquTOKxx/3r8KiNc63xxRA==

5xTbq0yL85f2O8soEE0aWGxrjA==

b4/knWkfwQCByw==

AnrOservDq83Fw92/GiG7pk9VAzP

o7ULEGiFpFC6VQ15RtI=

pcuYY7Ei2ReJqmM=

kNvNtWa/SQJpV3t4NFw83Ea4URzU

eGmxllMUuHzf

xwWU/I4R3RuT0A==

h4kM4poKqlXK9NCgTs8=

HkWLW5J3hL6vF2MFgsnAa5N5kpHF

u+nKjgM7r0ewzdd2gqDW

XE4s8ioNHndqM2P+krcGi9g=

OoVuNLkVoUGpwd56GXTPATwOJycptRJwdg==

n5cbiNrqOcpcqGw=

1dve5llFRkJ333E=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\c5eb2e141e2889e82b551dc4804f872a59a5846aae7c4419409fd13fb94f3deb.exe
      "C:\Users\Admin\AppData\Local\Temp\c5eb2e141e2889e82b551dc4804f872a59a5846aae7c4419409fd13fb94f3deb.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe
        "C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:680
        • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe
          "C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe"
          4⤵
          • Executes dropped EXE
          PID:684
        • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe
          "C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe"
          4⤵
          • Checks computer location settings
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1856
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:764
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1700

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ckccw.rj

      Filesize

      185KB

      MD5

      c145798b743195c6d571cca261ed5c55

      SHA1

      7e766ec4aad95e77048d756243d56cb99bcd06e8

      SHA256

      3f1fb5182d48be6c1475d9cfda214bd3d3e6525f561893388d78309a77d40018

      SHA512

      497d29a45b83ff6e89dcebfd029fa0c07d1c7c5dbdf52fb6a29d1acf9a3de185d4a216147c145d7bfa2ad04afb169f47ee9e2dc6105c0f9da87ac11a0bb54671

    • C:\Users\Admin\AppData\Local\Temp\didpmrwmruv.fmv

      Filesize

      4KB

      MD5

      2714524f2a58119d0d63428bb4ff9aac

      SHA1

      61359669c76613f0cac4057b7a295b333d80747d

      SHA256

      f58b3a1609dee2319105cb430598ef8a4733c413d6cb1ebabb6e959d1fa0dc2b

      SHA512

      76bbd27394b25ab6954a068586910777f2489f35ec56b0e2a18ed1ed421cdeeee32f1fc35d4437a8c8f8fb95ea34d706b04e7ec53535636655eb6bcdd95b0735

    • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • C:\Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • \Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • \Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • \Users\Admin\AppData\Local\Temp\nreoeeae.exe

      Filesize

      123KB

      MD5

      fbd682f22326178a4ecd1b2cd587efa9

      SHA1

      fe461dac0ce4ee3f4bb9b8cf9a06d1d01bcb1f6b

      SHA256

      6a80bc961b23f3b23cbe9b959f2c9e08eaa3f9705338ddb8185f8f593f2ef604

      SHA512

      28dda49307c39667e5fee8a71dc31e9a0232c221acb81204acb617522fc809a98830506cc9bb117c07ab509f423782886cd563f1ed6b48f4b74c1935dcc378ae

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      1.1MB

      MD5

      f55e5766477de5997da50f12c9c74c91

      SHA1

      4dc98900a887be95411f07b9e597c57bdc7dbab3

      SHA256

      90be88984ee60864256378c952d44b13d55ac032ab6a7b8c698885176bcece69

      SHA512

      983417a297e68b58fbd1c07fed7a1697d249110a2c10644b2dc96e3facedd3fbfbcac6a7809631ffd62894f02cadd4d3e62022b9e5e026e5bf434f1eb1878f05

    • memory/680-56-0x0000000000000000-mapping.dmp

    • memory/764-73-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/764-72-0x0000000000DF0000-0x0000000000DFD000-memory.dmp

      Filesize

      52KB

    • memory/764-77-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/764-75-0x0000000000830000-0x00000000008BF000-memory.dmp

      Filesize

      572KB

    • memory/764-74-0x00000000009C0000-0x0000000000CC3000-memory.dmp

      Filesize

      3.0MB

    • memory/764-71-0x0000000000000000-mapping.dmp

    • memory/1212-76-0x0000000004F70000-0x0000000005094000-memory.dmp

      Filesize

      1.1MB

    • memory/1212-70-0x0000000004C40000-0x0000000004D44000-memory.dmp

      Filesize

      1.0MB

    • memory/1212-79-0x0000000004F70000-0x0000000005094000-memory.dmp

      Filesize

      1.1MB

    • memory/1856-69-0x0000000000120000-0x0000000000130000-memory.dmp

      Filesize

      64KB

    • memory/1856-67-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1856-68-0x0000000000950000-0x0000000000C53000-memory.dmp

      Filesize

      3.0MB

    • memory/1856-65-0x00000000004012B0-mapping.dmp

    • memory/1992-54-0x0000000075F61000-0x0000000075F63000-memory.dmp

      Filesize

      8KB