Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25-11-2022 11:29

General

  • Target

    PI.xls

  • Size

    572KB

  • MD5

    bb4c1fc0513552cb4a5845d8acad983c

  • SHA1

    176b67e99bb252345bf71b30e909a47f6f95333d

  • SHA256

    9eb2b7acb3ab10e79a731f59d8cb0674cdaeff303db290a18e86d808d0aeb6ca

  • SHA512

    d6c0db3f2bb3bc1fcdf2f3dd42f7e8f4971b1163c219e7482734ca8feca0d2211fa0089096d0cf3a093b076898b4b260b8e48f271a27e75cff592744b47f0ace

  • SSDEEP

    12288:l5UMHq/88o5zJOcVLEP9iEtHlifM9fGaHC:l2M2C5zJwbtHv9fGa

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

nurs

Decoy

caixinhascomcarinho.com

abinotools.com

oporto-tours.com

iruos.com

yesmamawinebar.com

wwwscu.com

habit2impact.com

antigenresearch.com

ux4space.com

diarypisces.com

cryptopers.com

lovingmoreband.com

beerwars.net

ascariproject.site

livesoccerhd.info

bluestardivingschool.com

pluik.com

snorrky.space

lcoi9.com

phantomxr.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 14 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 6 IoCs
  • Checks computer location settings 2 TTPs 2 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops file in System32 directory 2 IoCs
  • Suspicious use of SetThreadContext 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 6 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates system info in registry 2 TTPs 5 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 32 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 40 IoCs
  • Suspicious use of SetWindowsHookEx 14 IoCs
  • Suspicious use of WriteProcessMemory 46 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3004
    • C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE
      "C:\Program Files\Microsoft Office\Root\Office16\EXCEL.EXE" "C:\Users\Admin\AppData\Local\Temp\PI.xls"
      2⤵
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2228
      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Modifies registry class
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\temp\4_26\ojulmltrx.vbe"
          4⤵
          • Checks computer location settings
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:4788
          • C:\Users\Admin\AppData\Local\Temp\4_26\gtolaje.exe
            "C:\Users\Admin\AppData\Local\Temp\4_26\gtolaje.exe" pbotw.xml
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:2080
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1984
              • C:\Users\Admin\AppData\Local\Temp\FB_5BE6.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\FB_5BE6.tmp.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                PID:3212
              • C:\Users\Admin\AppData\Local\Temp\FB_5D8D.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\FB_5D8D.tmp.exe"
                7⤵
                • Executes dropped EXE
                PID:4164
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 4164 -s 940
                  8⤵
                  • Program crash
                  PID:1516
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:2928
              • C:\Users\Admin\AppData\Local\Temp\FB_5B3A.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\FB_5B3A.tmp.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetThreadContext
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious behavior: MapViewOfSection
                • Suspicious use of AdjustPrivilegeToken
                PID:1492
              • C:\Users\Admin\AppData\Local\Temp\FB_5D10.tmp.exe
                "C:\Users\Admin\AppData\Local\Temp\FB_5D10.tmp.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of WriteProcessMemory
                PID:1840
                • C:\Windows\SYSTEM32\cmd.exe
                  "cmd.exe" /C schtasks /create /tn \oflgwXquKB /tr "C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                  8⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2296
                  • C:\Windows\system32\schtasks.exe
                    schtasks /create /tn \oflgwXquKB /tr "C:\Users\Admin\AppData\Roaming\oflgwXquKB\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:4400
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4784
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\FB_5B3A.tmp.exe"
        3⤵
          PID:4340
      • C:\Windows\SysWOW64\msdt.exe
        "C:\Windows\SysWOW64\msdt.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3660
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k netsvcs -p
      1⤵
      • Drops file in System32 directory
      • Checks processor information in registry
      • Enumerates system info in registry
      PID:4724
    • C:\Windows\system32\WerFault.exe
      C:\Windows\system32\WerFault.exe -pss -s 184 -p 4164 -ip 4164
      1⤵
        PID:2964

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\4_26\crga.xl
        Filesize

        49KB

        MD5

        65c6c8f6b3a823b991728d34bb147987

        SHA1

        50a8bb000801df7866fe37acbd8e8e8d0ba52e38

        SHA256

        0d64e271164958c877b0bf44b16e1ae00382e0d7db304e2458aaa810973b5393

        SHA512

        30ce653a8e526fc68ee2055fd88748e97134a4d41284e6c35ca02557892fe4f7ea621139b4fbd8a22430d1a7f53da1f29b6dde8bc2c5ae33acfd3427bb84b80d

      • C:\Users\Admin\AppData\Local\Temp\4_26\gtolaje.exe
        Filesize

        925KB

        MD5

        4897990addbe336ab1dda8e97d159d34

        SHA1

        0914b338d061b85e55cd40dbec926ce0d47c9fd5

        SHA256

        a1556a7149f87c7b52f95ab2109a945c917a6876a50d1a3750594224649c0120

        SHA512

        14f6513fe1ec061e18a995de1516768fa76c3e6c988015deb298c451b188964d5ca88ff14409ac755f82604961b89619f47cfb9b1229192369182c9e34668946

      • C:\Users\Admin\AppData\Local\Temp\4_26\gtolaje.exe
        Filesize

        925KB

        MD5

        4897990addbe336ab1dda8e97d159d34

        SHA1

        0914b338d061b85e55cd40dbec926ce0d47c9fd5

        SHA256

        a1556a7149f87c7b52f95ab2109a945c917a6876a50d1a3750594224649c0120

        SHA512

        14f6513fe1ec061e18a995de1516768fa76c3e6c988015deb298c451b188964d5ca88ff14409ac755f82604961b89619f47cfb9b1229192369182c9e34668946

      • C:\Users\Admin\AppData\Local\Temp\4_26\pbotw.xml
        Filesize

        102.7MB

        MD5

        dd7643205dc0fd6c4ff299c91bddf8c9

        SHA1

        1acaf73a9fb77ddc58c01ecb312f3ec8d973f0b0

        SHA256

        9ccf2d739a9b8abf4771bfcd1552939e2d38cb69772f473ebd9f4541474a5242

        SHA512

        2186bc19c42ae586ea660dca2b2644f8d30e707f456e1cb90660edcf762ec86c65c8c111835c5d53cc50b8fb3c78df054f14885a5a4d900dc777fd4ef6bf425f

      • C:\Users\Admin\AppData\Local\Temp\4_26\uwsrkdh.dkl
        Filesize

        422KB

        MD5

        b584955531ad9e56ad06887281079f54

        SHA1

        f5284434cd7f5066e4458ff910421646892936ec

        SHA256

        b4012b8bad7ae693fcaaf4ce1fbe53d82a119a6f39b035ae5eb71a75438f1ecf

        SHA512

        bb124bdf1cada4528cb10920ba276a7c9b307e8e5a247dc92c53930d09452ef5fa1d96e4ab2e94498380dccbb88e8972c53a18003835d541f36dbc5fd9f64277

      • C:\Users\Admin\AppData\Local\Temp\FB_5B3A.tmp.exe
        Filesize

        185KB

        MD5

        73128d61a0c856672854627f377cd9f7

        SHA1

        37f2763211c230274ae08f1c0b8b4c656c13c51d

        SHA256

        332e3acb8e9f9a237095848c94153160b9b1a44426c6c2bf0084e9de7e08335d

        SHA512

        7c44c0dcde380656ab754274618125ef56faa5ea4f33aabb0d27ec4bf35f3f15692d670dfa3e33c48b53d7dfbed2798aad7da9c13fe77948fa981f31d23d8f39

      • C:\Users\Admin\AppData\Local\Temp\FB_5B3A.tmp.exe
        Filesize

        185KB

        MD5

        73128d61a0c856672854627f377cd9f7

        SHA1

        37f2763211c230274ae08f1c0b8b4c656c13c51d

        SHA256

        332e3acb8e9f9a237095848c94153160b9b1a44426c6c2bf0084e9de7e08335d

        SHA512

        7c44c0dcde380656ab754274618125ef56faa5ea4f33aabb0d27ec4bf35f3f15692d670dfa3e33c48b53d7dfbed2798aad7da9c13fe77948fa981f31d23d8f39

      • C:\Users\Admin\AppData\Local\Temp\FB_5BE6.tmp.exe
        Filesize

        185KB

        MD5

        73128d61a0c856672854627f377cd9f7

        SHA1

        37f2763211c230274ae08f1c0b8b4c656c13c51d

        SHA256

        332e3acb8e9f9a237095848c94153160b9b1a44426c6c2bf0084e9de7e08335d

        SHA512

        7c44c0dcde380656ab754274618125ef56faa5ea4f33aabb0d27ec4bf35f3f15692d670dfa3e33c48b53d7dfbed2798aad7da9c13fe77948fa981f31d23d8f39

      • C:\Users\Admin\AppData\Local\Temp\FB_5BE6.tmp.exe
        Filesize

        185KB

        MD5

        73128d61a0c856672854627f377cd9f7

        SHA1

        37f2763211c230274ae08f1c0b8b4c656c13c51d

        SHA256

        332e3acb8e9f9a237095848c94153160b9b1a44426c6c2bf0084e9de7e08335d

        SHA512

        7c44c0dcde380656ab754274618125ef56faa5ea4f33aabb0d27ec4bf35f3f15692d670dfa3e33c48b53d7dfbed2798aad7da9c13fe77948fa981f31d23d8f39

      • C:\Users\Admin\AppData\Local\Temp\FB_5D10.tmp.exe
        Filesize

        8KB

        MD5

        fa22ef17a3b0bdb50020d4f27ad2feec

        SHA1

        634ecd4159890f24dce98a71b39a86ffdfd207bd

        SHA256

        81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

        SHA512

        fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

      • C:\Users\Admin\AppData\Local\Temp\FB_5D10.tmp.exe
        Filesize

        8KB

        MD5

        fa22ef17a3b0bdb50020d4f27ad2feec

        SHA1

        634ecd4159890f24dce98a71b39a86ffdfd207bd

        SHA256

        81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

        SHA512

        fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

      • C:\Users\Admin\AppData\Local\Temp\FB_5D8D.tmp.exe
        Filesize

        8KB

        MD5

        fa22ef17a3b0bdb50020d4f27ad2feec

        SHA1

        634ecd4159890f24dce98a71b39a86ffdfd207bd

        SHA256

        81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

        SHA512

        fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

      • C:\Users\Admin\AppData\Local\Temp\FB_5D8D.tmp.exe
        Filesize

        8KB

        MD5

        fa22ef17a3b0bdb50020d4f27ad2feec

        SHA1

        634ecd4159890f24dce98a71b39a86ffdfd207bd

        SHA256

        81aa7692e1e20c72d05efa7fcde837f4306a6c95798d49acf734fff49015fc1c

        SHA512

        fc5e6d9e61df6d5c54a73e44e9a8f82a0df6006d7ab60b1a1199928df6eaf46610d4db53ce18fba84de4b93b29ff23fd17fe4d3d3b9d3afbf44ba65478c89408

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        Filesize

        1.1MB

        MD5

        d997a93c96c04fccf6ebe280ab6b025b

        SHA1

        27627f774f7a30428e4a7be77a49f413fd16f740

        SHA256

        ebb76e46e178491fd48787e80ce952910124d6f1a00c92744a5f84278192030c

        SHA512

        abe758baa50d9929fd364ac68559b89b310db4e2805bef1e909e4f9ec0a3d941b9298cc1693b590265a92e6e21459abda1e5b90ec5816d37ab7a23d7711310b1

      • C:\Users\Admin\AppData\Local\Temp\svchost.exe
        Filesize

        1.1MB

        MD5

        d997a93c96c04fccf6ebe280ab6b025b

        SHA1

        27627f774f7a30428e4a7be77a49f413fd16f740

        SHA256

        ebb76e46e178491fd48787e80ce952910124d6f1a00c92744a5f84278192030c

        SHA512

        abe758baa50d9929fd364ac68559b89b310db4e2805bef1e909e4f9ec0a3d941b9298cc1693b590265a92e6e21459abda1e5b90ec5816d37ab7a23d7711310b1

      • C:\Users\Admin\AppData\Local\temp\4_26\ojulmltrx.vbe
        Filesize

        56KB

        MD5

        16e38ea83da0c42e00bf40ac9ebe50bd

        SHA1

        76b93af0fba674698f0ea93bbff0e3c086c0b109

        SHA256

        c8a7ef3351c9161bd92123a88407654cf6ff2075158c3bd0eb41429ccf40ab20

        SHA512

        773f9434ce500113c5a99bc0c6e70b237e93bd464f5419e0fde8b03e5396cdefe67414dc42b8b732b83602d8f9362eb836e51ea52663d3a63dc8df7b04f99162

      • memory/1492-175-0x0000000000FC0000-0x0000000000FD4000-memory.dmp
        Filesize

        80KB

      • memory/1492-178-0x0000000001320000-0x000000000166A000-memory.dmp
        Filesize

        3.3MB

      • memory/1492-158-0x0000000000000000-mapping.dmp
      • memory/1840-173-0x00007FFD61920000-0x00007FFD623E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1840-161-0x0000000000000000-mapping.dmp
      • memory/1840-169-0x0000000000290000-0x0000000000298000-memory.dmp
        Filesize

        32KB

      • memory/1840-192-0x00007FFD61920000-0x00007FFD623E1000-memory.dmp
        Filesize

        10.8MB

      • memory/1984-150-0x0000000000000000-mapping.dmp
      • memory/1984-154-0x0000000000400000-0x0000000000B08000-memory.dmp
        Filesize

        7.0MB

      • memory/1984-170-0x0000000000400000-0x0000000000B08000-memory.dmp
        Filesize

        7.0MB

      • memory/1984-157-0x0000000000400000-0x0000000000B08000-memory.dmp
        Filesize

        7.0MB

      • memory/2080-145-0x0000000000000000-mapping.dmp
      • memory/2228-200-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-136-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-135-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-137-0x00007FFD49000000-0x00007FFD49010000-memory.dmp
        Filesize

        64KB

      • memory/2228-138-0x00007FFD49000000-0x00007FFD49010000-memory.dmp
        Filesize

        64KB

      • memory/2228-132-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-134-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-198-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-133-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-199-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2228-201-0x00007FFD4B270000-0x00007FFD4B280000-memory.dmp
        Filesize

        64KB

      • memory/2296-191-0x0000000000000000-mapping.dmp
      • memory/2380-139-0x0000000000000000-mapping.dmp
      • memory/2928-151-0x0000000000000000-mapping.dmp
      • memory/2928-167-0x0000000000400000-0x0000000000435000-memory.dmp
        Filesize

        212KB

      • memory/2928-155-0x0000000000400000-0x0000000000435000-memory.dmp
        Filesize

        212KB

      • memory/2928-152-0x0000000000400000-0x0000000000435000-memory.dmp
        Filesize

        212KB

      • memory/3004-179-0x0000000008B40000-0x0000000008CC0000-memory.dmp
        Filesize

        1.5MB

      • memory/3004-180-0x0000000009100000-0x0000000009279000-memory.dmp
        Filesize

        1.5MB

      • memory/3004-202-0x0000000003720000-0x0000000003802000-memory.dmp
        Filesize

        904KB

      • memory/3004-196-0x0000000003720000-0x0000000003802000-memory.dmp
        Filesize

        904KB

      • memory/3212-174-0x00000000010B0000-0x00000000013FA000-memory.dmp
        Filesize

        3.3MB

      • memory/3212-162-0x0000000000000000-mapping.dmp
      • memory/3212-176-0x0000000000AF0000-0x0000000000B04000-memory.dmp
        Filesize

        80KB

      • memory/3660-187-0x00000000003C0000-0x0000000000417000-memory.dmp
        Filesize

        348KB

      • memory/3660-188-0x0000000000420000-0x000000000044F000-memory.dmp
        Filesize

        188KB

      • memory/3660-189-0x00000000027F0000-0x0000000002B3A000-memory.dmp
        Filesize

        3.3MB

      • memory/3660-182-0x0000000000000000-mapping.dmp
      • memory/4164-190-0x00007FFD61920000-0x00007FFD623E1000-memory.dmp
        Filesize

        10.8MB

      • memory/4164-168-0x0000000000000000-mapping.dmp
      • memory/4164-177-0x00007FFD61920000-0x00007FFD623E1000-memory.dmp
        Filesize

        10.8MB

      • memory/4340-186-0x0000000000000000-mapping.dmp
      • memory/4400-193-0x0000000000000000-mapping.dmp
      • memory/4784-195-0x0000000000BD0000-0x0000000000C63000-memory.dmp
        Filesize

        588KB

      • memory/4784-194-0x0000000000660000-0x000000000068F000-memory.dmp
        Filesize

        188KB

      • memory/4784-185-0x0000000000660000-0x000000000068F000-memory.dmp
        Filesize

        188KB

      • memory/4784-184-0x00000000008D0000-0x00000000008E7000-memory.dmp
        Filesize

        92KB

      • memory/4784-183-0x0000000000D20000-0x000000000106A000-memory.dmp
        Filesize

        3.3MB

      • memory/4784-181-0x0000000000000000-mapping.dmp
      • memory/4788-142-0x0000000000000000-mapping.dmp