Analysis

  • max time kernel
    251s
  • max time network
    341s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 07:41

General

  • Target

    e128315b2d2ffd6e1875157e2f73cf0f.exe

  • Size

    533KB

  • MD5

    e128315b2d2ffd6e1875157e2f73cf0f

  • SHA1

    0c33d30e0fe0deb22bc7bb9ebb149d2fb547210b

  • SHA256

    2728b4a373b5fe9349f007facb3e2194f41b80ec41aa0eb87864bf81e7da0b8e

  • SHA512

    cb60e487426c7a73e871d8b8f0296c5772d36c02e3fc461409ba739186112f962a3028f8b108d9c8f1789454e6072b2b58454d8b7342c879003b342c060398ce

  • SSDEEP

    12288:3AU8NBDoAfPPrhbNzuOhI7iXGbLulrTcsS:wU8wAfn1pN4ulrPS

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sk19

Decoy

21diasdegratitud.com

kx1993.com

chasergt.com

837news.com

naturagent.co.uk

gatorinsurtech.com

iyaboolashilesblog.africa

jamtanganmurah.online

gguminsa.com

lilliesdrop.com

lenvera.com

link48.co.uk

azinos777.fun

lgcdct.cfd

bg-gobtc.com

livecarrer.uk

cbq4u.com

imalreadygone.com

wabeng.africa

jxmheiyouyuetot.tokyo

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\e128315b2d2ffd6e1875157e2f73cf0f.exe
      "C:\Users\Admin\AppData\Local\Temp\e128315b2d2ffd6e1875157e2f73cf0f.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:692
      • C:\Users\Admin\AppData\Local\Temp\mqmizy.exe
        "C:\Users\Admin\AppData\Local\Temp\mqmizy.exe" C:\Users\Admin\AppData\Local\Temp\fwdjlvp.yjn
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:576
        • C:\Users\Admin\AppData\Local\Temp\mqmizy.exe
          "C:\Users\Admin\AppData\Local\Temp\mqmizy.exe" C:\Users\Admin\AppData\Local\Temp\fwdjlvp.yjn
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:700
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            5⤵
              PID:1404
            • C:\Windows\SysWOW64\cmstp.exe
              "C:\Windows\SysWOW64\cmstp.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1544
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Local\Temp\mqmizy.exe"
                6⤵
                  PID:1132

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\fwdjlvp.yjn
        Filesize

        5KB

        MD5

        538c6e7807cc1922a26b98fde0b3ce76

        SHA1

        3e690e2044cda5d808ef2c72a43b1ab4a776381a

        SHA256

        faeff79fcb52c1a76a0db376df4889e4185bfddf221103e8c0580cc3f2f8b78d

        SHA512

        0596b3758bfe202b9e061c725367f3369837c1712cdb2d105dfa651e5d40afa5d363518ce43bac3fb64702db61c918edc4e2c34c1f33f5a65720a18686cfd327

      • C:\Users\Admin\AppData\Local\Temp\mqmizy.exe
        Filesize

        333KB

        MD5

        b9a30f1dba15fe54ed321d5d2407ddea

        SHA1

        9c262c900e534f0fbf108a242b4cb74ad88af9ff

        SHA256

        9ab3df410b51387e6ef2d4135934b6b8a5d496bbee1686c0a800527b7dbb90e7

        SHA512

        fcece47e5df307ff3576b237a02c894ef9fff66837ad5318017abcfb16bb702fb0ab96e11e7296481386b8e9184285535d34688da0df85ee7320893a589bc1fd

      • C:\Users\Admin\AppData\Local\Temp\mqmizy.exe
        Filesize

        333KB

        MD5

        b9a30f1dba15fe54ed321d5d2407ddea

        SHA1

        9c262c900e534f0fbf108a242b4cb74ad88af9ff

        SHA256

        9ab3df410b51387e6ef2d4135934b6b8a5d496bbee1686c0a800527b7dbb90e7

        SHA512

        fcece47e5df307ff3576b237a02c894ef9fff66837ad5318017abcfb16bb702fb0ab96e11e7296481386b8e9184285535d34688da0df85ee7320893a589bc1fd

      • C:\Users\Admin\AppData\Local\Temp\mqmizy.exe
        Filesize

        333KB

        MD5

        b9a30f1dba15fe54ed321d5d2407ddea

        SHA1

        9c262c900e534f0fbf108a242b4cb74ad88af9ff

        SHA256

        9ab3df410b51387e6ef2d4135934b6b8a5d496bbee1686c0a800527b7dbb90e7

        SHA512

        fcece47e5df307ff3576b237a02c894ef9fff66837ad5318017abcfb16bb702fb0ab96e11e7296481386b8e9184285535d34688da0df85ee7320893a589bc1fd

      • C:\Users\Admin\AppData\Local\Temp\yabeo.x
        Filesize

        185KB

        MD5

        13f0552fedffd4cc496a75c07d2c4802

        SHA1

        370970d782fa9b6d34c57512286c097658981c10

        SHA256

        523fc0b5e81ba0cb23f60706a8827da60d98f2853ef6d9a455e235a47aa4c81a

        SHA512

        64dba5c5abd8711f5eee5c0687862aef82e65564bdc3d9abb3b4640dbdc43c4e44c143a1117a5561e257e9b946ea445aaa528370bdf562f619304bc312581a52

      • \Users\Admin\AppData\Local\Temp\mqmizy.exe
        Filesize

        333KB

        MD5

        b9a30f1dba15fe54ed321d5d2407ddea

        SHA1

        9c262c900e534f0fbf108a242b4cb74ad88af9ff

        SHA256

        9ab3df410b51387e6ef2d4135934b6b8a5d496bbee1686c0a800527b7dbb90e7

        SHA512

        fcece47e5df307ff3576b237a02c894ef9fff66837ad5318017abcfb16bb702fb0ab96e11e7296481386b8e9184285535d34688da0df85ee7320893a589bc1fd

      • \Users\Admin\AppData\Local\Temp\mqmizy.exe
        Filesize

        333KB

        MD5

        b9a30f1dba15fe54ed321d5d2407ddea

        SHA1

        9c262c900e534f0fbf108a242b4cb74ad88af9ff

        SHA256

        9ab3df410b51387e6ef2d4135934b6b8a5d496bbee1686c0a800527b7dbb90e7

        SHA512

        fcece47e5df307ff3576b237a02c894ef9fff66837ad5318017abcfb16bb702fb0ab96e11e7296481386b8e9184285535d34688da0df85ee7320893a589bc1fd

      • memory/576-56-0x0000000000000000-mapping.dmp
      • memory/692-54-0x0000000075D51000-0x0000000075D53000-memory.dmp
        Filesize

        8KB

      • memory/700-67-0x0000000000340000-0x0000000000354000-memory.dmp
        Filesize

        80KB

      • memory/700-71-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/700-66-0x0000000000900000-0x0000000000C03000-memory.dmp
        Filesize

        3.0MB

      • memory/700-63-0x000000000041F100-mapping.dmp
      • memory/700-65-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/700-69-0x0000000000390000-0x00000000003A4000-memory.dmp
        Filesize

        80KB

      • memory/1132-74-0x0000000000000000-mapping.dmp
      • memory/1228-70-0x0000000004D10000-0x0000000004E5D000-memory.dmp
        Filesize

        1.3MB

      • memory/1228-68-0x0000000004BC0000-0x0000000004D0E000-memory.dmp
        Filesize

        1.3MB

      • memory/1228-79-0x00000000047D0000-0x00000000048BE000-memory.dmp
        Filesize

        952KB

      • memory/1228-81-0x00000000047D0000-0x00000000048BE000-memory.dmp
        Filesize

        952KB

      • memory/1544-72-0x0000000000000000-mapping.dmp
      • memory/1544-75-0x0000000000090000-0x00000000000A8000-memory.dmp
        Filesize

        96KB

      • memory/1544-76-0x00000000000B0000-0x00000000000DF000-memory.dmp
        Filesize

        188KB

      • memory/1544-77-0x0000000001F70000-0x0000000002273000-memory.dmp
        Filesize

        3.0MB

      • memory/1544-78-0x0000000001E20000-0x0000000001EB3000-memory.dmp
        Filesize

        588KB

      • memory/1544-80-0x00000000000B0000-0x00000000000DF000-memory.dmp
        Filesize

        188KB