Analysis

  • max time kernel
    195s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 07:36

General

  • Target

    DHL Shipment_pdf.exe

  • Size

    253KB

  • MD5

    6c47810c50e5d51c52010f6497b192cc

  • SHA1

    46c1da4c046006d84a306b824e2f9f65a034e389

  • SHA256

    75487358663f47e70846be7ae195c335bb35cbe469c93503f537e75855082f01

  • SHA512

    ab56561a813a1730a63c3d474178d7a0d57394979eb8d5babd98742a3556f4805b88e13c505dbf5169740cc0a3dbffb994b58284d9343f64d835042299e8bbcf

  • SSDEEP

    6144:xBnQPEBXJ9LLlsp1mjwi2OsedFcBzX1GuW5uC1O:8P4Zc1Ow5eTcBbAn5u3

Malware Config

Extracted

Family

formbook

Campaign

olus

Decoy

lFwthdzYgacRjF3H

V0HcUpvjRfyxLCVc/Qu1

fVMwe8B1QkymDetjpI9uzecX

QgKu/wmjhaT79V7jTK/HjhUCywqs3TQ=

21I9i5OSAoodam1rOQ==

QCVAvA3e02NvjlzP

khZ3sq8WGuiMAg==

K+U9rwDkZhi7

Uii7NZQ3FCKY+7Agf4JuzecX

nWYwbrNxWOGgJCNc/Qu1

yxFqsrsU9YyQnUJ4pMtHWw==

H+pDjL3qLrqbfeQYPlmASHc2eg==

OKO55xmvnyzvSF1uS5I=

VT4daWvLpsxvjlzP

SaUHe81zYnTzcTZc/Qu1

Df2M0dtCH1sGvxA5Jw==

NAsWerPSMayThrruHxHdjjUqeA==

+Nxhp7kZ4v7L+nvFkI0=

KhEcfId5vUQQezJiSbvWaZrdJmg=

9aEE7WN4555vjlzP

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2080
    • C:\Users\Admin\AppData\Local\Temp\DHL Shipment_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\DHL Shipment_pdf.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1676
      • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
        "C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe" C:\Users\Admin\AppData\Local\Temp\pwpwushk.h
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:744
        • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
          "C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe" C:\Users\Admin\AppData\Local\Temp\pwpwushk.h
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:308
          • C:\Windows\SysWOW64\cscript.exe
            "C:\Windows\SysWOW64\cscript.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3904
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              6⤵
                PID:816
      • C:\Windows\SysWOW64\netsh.exe
        "C:\Windows\SysWOW64\netsh.exe"
        2⤵
          PID:3480
        • C:\Windows\SysWOW64\msdt.exe
          "C:\Windows\SysWOW64\msdt.exe"
          2⤵
            PID:3692

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\pwpwushk.h
          Filesize

          5KB

          MD5

          2be139593e0b3fadf40d783a5a82e4fe

          SHA1

          78f5fe723b55100566cf7c13870262df7074a137

          SHA256

          14f4254ad6ded053edb5cf633ac3d9ae6cba67eac00cb007b0bb84cdb50333f5

          SHA512

          6938c2db0dc7e2041cc4e45b2b5a521ff9a2181f9934d9ae3984b8fdb688cef4b7b5a45a4f53f6f62383cf94657cdd260c71b82b58dd4a06f7203b2417c3df69

        • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
          Filesize

          46KB

          MD5

          27541d5316db05b650ab973fd2aec842

          SHA1

          ec706f8d9bced58fff747022891c64b6a2148d2f

          SHA256

          720ea640a85baea2835b01c5a6819dd7a129f97e5d4049b63f07b4e007eb8298

          SHA512

          ad0e19c92fd8f8e4025ae82a2b3caf89501f2a8e3073c910bf100a8a3c06fb1f62ea955e92dab23350ab7f92420c704740c2baba8782a923b7025f93b06dab73

        • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
          Filesize

          46KB

          MD5

          27541d5316db05b650ab973fd2aec842

          SHA1

          ec706f8d9bced58fff747022891c64b6a2148d2f

          SHA256

          720ea640a85baea2835b01c5a6819dd7a129f97e5d4049b63f07b4e007eb8298

          SHA512

          ad0e19c92fd8f8e4025ae82a2b3caf89501f2a8e3073c910bf100a8a3c06fb1f62ea955e92dab23350ab7f92420c704740c2baba8782a923b7025f93b06dab73

        • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
          Filesize

          46KB

          MD5

          27541d5316db05b650ab973fd2aec842

          SHA1

          ec706f8d9bced58fff747022891c64b6a2148d2f

          SHA256

          720ea640a85baea2835b01c5a6819dd7a129f97e5d4049b63f07b4e007eb8298

          SHA512

          ad0e19c92fd8f8e4025ae82a2b3caf89501f2a8e3073c910bf100a8a3c06fb1f62ea955e92dab23350ab7f92420c704740c2baba8782a923b7025f93b06dab73

        • C:\Users\Admin\AppData\Local\Temp\xkypvuq.ifm
          Filesize

          185KB

          MD5

          f3a22ba1cff1d318f4c25580b7976980

          SHA1

          e7a12c3c666f36ee7b3417ca4800b8a5463e39a7

          SHA256

          58eb30235dea07294d733f1da23c47726bf0195cea4cd271096205bbb348715f

          SHA512

          efd1e1ff8269bdf0fddd020a536e9f26d58d331348b3b9763803069f3213aa5b6f913697735dc3cc0ffad49f666eaf3b2a261e0e874d19805ffb3483a32cb68f

        • memory/308-142-0x0000000000AA0000-0x0000000000AB0000-memory.dmp
          Filesize

          64KB

        • memory/308-144-0x00000000026B0000-0x00000000026C0000-memory.dmp
          Filesize

          64KB

        • memory/308-139-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/308-140-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/308-141-0x0000000000B00000-0x0000000000E4A000-memory.dmp
          Filesize

          3.3MB

        • memory/308-137-0x0000000000000000-mapping.dmp
        • memory/308-146-0x0000000000400000-0x000000000042F000-memory.dmp
          Filesize

          188KB

        • memory/744-132-0x0000000000000000-mapping.dmp
        • memory/2080-145-0x0000000008860000-0x0000000008920000-memory.dmp
          Filesize

          768KB

        • memory/2080-143-0x0000000008780000-0x0000000008859000-memory.dmp
          Filesize

          868KB

        • memory/2080-153-0x00000000030A0000-0x000000000317D000-memory.dmp
          Filesize

          884KB

        • memory/2080-154-0x00000000030A0000-0x000000000317D000-memory.dmp
          Filesize

          884KB

        • memory/3904-147-0x0000000000000000-mapping.dmp
        • memory/3904-149-0x0000000000410000-0x000000000043D000-memory.dmp
          Filesize

          180KB

        • memory/3904-148-0x0000000000460000-0x0000000000487000-memory.dmp
          Filesize

          156KB

        • memory/3904-150-0x00000000026C0000-0x0000000002A0A000-memory.dmp
          Filesize

          3.3MB

        • memory/3904-151-0x0000000000410000-0x000000000043D000-memory.dmp
          Filesize

          180KB

        • memory/3904-152-0x0000000002510000-0x000000000259F000-memory.dmp
          Filesize

          572KB