Analysis

  • max time kernel
    169s
  • max time network
    183s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 07:36

General

  • Target

    Urgent quote request -pdf-.js

  • Size

    341KB

  • MD5

    59b4d0fb62bea58db86b5f9b82382f21

  • SHA1

    57bae158e509b8e23c3347efeaf00553920b8bf6

  • SHA256

    3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871

  • SHA512

    d09975b8ecf9de689bf7e9cebfa9430940b6f465e00a15b4baeb839c598c61cac380263db96f027ef4328b705a773c3a4543961ba1806cc31c86a2fd82f29e6e

  • SSDEEP

    6144:D9w3fOYrR6SInG2u3Wp4cwRDyTlMiAaJ/jpPiWUiSFtroVSSM1tZQfm:YWaR6SInGj3WN6DyhMiASjpPhSFtroVI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

a24e

Decoy

flormarine.co.uk

theglazingsquad.uk

konarkpharma.com

maxpropertyfinanceuk.co.uk

jackson-ifc.com

yvonneazevedoimoveis.net

baystella.com

arexbaba.online

trihgd.xyz

filth520571.com

cikpkg.cfd

jakesupport.com

8863365.com

duniaslot777.online

lop3a.com

berkut-clan.ru

lernnavigator.com

elenaisaprincess.co.uk

daimadaquan.xyz

mychirocart.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Formbook payload 4 IoCs
  • Blocklisted process makes network request 6 IoCs
  • Executes dropped EXE 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2152
    • C:\Windows\system32\wscript.exe
      wscript.exe "C:\Users\Admin\AppData\Local\Temp\Urgent quote request -pdf-.js"
      2⤵
      • Checks computer location settings
      • Suspicious use of WriteProcessMemory
      PID:1188
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SfehVeXIsQ.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:1044
      • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe
        "C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:400
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3272
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"
        3⤵
          PID:4704

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe

      Filesize

      185KB

      MD5

      a20ea9350fa5aa4d9641723f3dfc1b31

      SHA1

      c23cf2953ea071eac81740a687473442c66e73de

      SHA256

      01afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae

      SHA512

      296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035

    • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe

      Filesize

      185KB

      MD5

      a20ea9350fa5aa4d9641723f3dfc1b31

      SHA1

      c23cf2953ea071eac81740a687473442c66e73de

      SHA256

      01afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae

      SHA512

      296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035

    • C:\Users\Admin\AppData\Roaming\SfehVeXIsQ.js

      Filesize

      5KB

      MD5

      ef7a0bcfc54e28b9a81af747b834c898

      SHA1

      47f605a45958a0beab476be0ef3b97434f7b999e

      SHA256

      24fc05651edf06401a27a583f1dbe295881a16f9f98a04321319f3873a8569a4

      SHA512

      c975ac3784e346a0ed4f754177f25d256b41bd0bf707f37f0e04e3d15022db5e6d9bfbe50719b8ac483f9b7406a0a3a2782a28f279a046f61faffb863ec5da31

    • memory/400-134-0x0000000000000000-mapping.dmp

    • memory/400-137-0x0000000001930000-0x0000000001C7A000-memory.dmp

      Filesize

      3.3MB

    • memory/400-138-0x00000000018F0000-0x0000000001904000-memory.dmp

      Filesize

      80KB

    • memory/1044-132-0x0000000000000000-mapping.dmp

    • memory/2152-146-0x0000000008060000-0x00000000081D6000-memory.dmp

      Filesize

      1.5MB

    • memory/2152-139-0x0000000007CB0000-0x0000000007DD4000-memory.dmp

      Filesize

      1.1MB

    • memory/2152-148-0x0000000008060000-0x00000000081D6000-memory.dmp

      Filesize

      1.5MB

    • memory/3272-140-0x0000000000000000-mapping.dmp

    • memory/3272-144-0x0000000001520000-0x000000000186A000-memory.dmp

      Filesize

      3.3MB

    • memory/3272-145-0x00000000013B0000-0x0000000001443000-memory.dmp

      Filesize

      588KB

    • memory/3272-142-0x0000000000E00000-0x0000000000E2F000-memory.dmp

      Filesize

      188KB

    • memory/3272-147-0x0000000000E00000-0x0000000000E2F000-memory.dmp

      Filesize

      188KB

    • memory/3272-141-0x0000000000E40000-0x0000000000E4B000-memory.dmp

      Filesize

      44KB

    • memory/4704-143-0x0000000000000000-mapping.dmp