Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    25-11-2022 15:38

General

  • Target

    7.exe

  • Size

    217KB

  • MD5

    3347779841d3da795c21302943eb3336

  • SHA1

    c06baa6711abdca45ef214fb071321de147a5b3f

  • SHA256

    bc07f5f2b53ecfe5def046099a57fb15658babfc18988d7b692c059fab32c249

  • SHA512

    6b9a358a6a2f3e1ed3811fafc0f730e47364cc6fd4fd77d139a72292e80e1985d0e17519ce24c6607e95c58651a2cefcc1d57c8b6ca49cb03b1f4ffb7ec896c4

  • SSDEEP

    6144:LEubXAxE9UJmPspuZMTexvFL6is5O+9R:LE8wxZIPlOTeFLHaP9

Malware Config

Extracted

Family

formbook

Campaign

ermr

Decoy

ErOK6LFCgNIAlQmH54oaYOL/CN29Z78=

qNSdDhu/PT/1fgafDagiCSZH1SY=

wLpPOAkYS8EABl3pHGc4hNT/Q1sHBrU=

jSxRvptHkeTGl7PT0SEmaZmjqzanuA==

b91oL+2wCcpyhnd6yvF6Pg==

mr81yp1/qqZX

hy7Xsz/PU/LWHMcGL4UYJx9n3A==

KlwrHt1gouPaXaWhoQ==

ng8M320IRJL9Ptw=

8GQbOXuaWxvKnNM=

XndOL7E5sNpVUNty4d/a

rryPBBC8PybYb+2h2MF3FHGL

kEoeyERSVCYO0g==

5/P+SBDby5hO

1fYXc30/h9W7iO17

34X+YKR+wRFE

8ir/X2MlVByh5lQ1ow8=

u9ikm2UMZ7J7hpCYow==

FLI+c3clp1BNDjVAfvC2Dnw=

t21Erq8/r09wAzAJTAH3Ng==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Program Files directory 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1284
    • C:\Users\Admin\AppData\Local\Temp\7.exe
      "C:\Users\Admin\AppData\Local\Temp\7.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1488
      • C:\Users\Admin\AppData\Local\Temp\7.exe
        "C:\Users\Admin\AppData\Local\Temp\7.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2004
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Adds policy Run key to start application
      • Suspicious use of SetThreadContext
      • Drops file in Program Files directory
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1552
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\7.exe"
        3⤵
        • Deletes itself
        PID:1176
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:592

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1176-67-0x0000000000000000-mapping.dmp
    • memory/1284-75-0x0000000004EA0000-0x0000000004F85000-memory.dmp
      Filesize

      916KB

    • memory/1284-72-0x0000000004EA0000-0x0000000004F85000-memory.dmp
      Filesize

      916KB

    • memory/1284-65-0x0000000004B50000-0x0000000004C8C000-memory.dmp
      Filesize

      1.2MB

    • memory/1488-55-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
      Filesize

      8KB

    • memory/1488-54-0x0000000000E50000-0x0000000000E8C000-memory.dmp
      Filesize

      240KB

    • memory/1552-68-0x0000000000E10000-0x0000000000E2B000-memory.dmp
      Filesize

      108KB

    • memory/1552-73-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1552-71-0x00000000003E0000-0x0000000000470000-memory.dmp
      Filesize

      576KB

    • memory/1552-70-0x0000000002230000-0x0000000002533000-memory.dmp
      Filesize

      3.0MB

    • memory/1552-69-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1552-66-0x0000000000000000-mapping.dmp
    • memory/2004-59-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/2004-64-0x00000000002A0000-0x00000000002B1000-memory.dmp
      Filesize

      68KB

    • memory/2004-63-0x0000000000920000-0x0000000000C23000-memory.dmp
      Filesize

      3.0MB

    • memory/2004-62-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/2004-60-0x0000000000420330-mapping.dmp
    • memory/2004-57-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB

    • memory/2004-56-0x0000000000400000-0x000000000042D000-memory.dmp
      Filesize

      180KB