Analysis

  • max time kernel
    190s
  • max time network
    206s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 07:36

General

  • Target

    Quote.js

  • Size

    346KB

  • MD5

    21199ca311ff9236a22bc04871f49361

  • SHA1

    14bf80cebe0fe6945ab146eb481a40d62df5f1d1

  • SHA256

    fcc21d800f2cd942cbb2777c40a8ebf831e7fce2e6c8c77d5fa8fd4e3709bd01

  • SHA512

    2696c74bae8749f26af0483807395356a0224c2124ac956cbb48e8026a705cc3bc1cc8056991385284636e4982dbaefb5a4887901459e41ff02bd0975f5927a0

  • SSDEEP

    6144:So6tITpn1wYXxLJCZQk5s1TAriIgnywLzTp1vQo:76tSJ1tXGaka1TArinBHtZ/

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

c0e5

Decoy

educao.pet

e-race.store

clitzhyper.com

webcheetahtech.online

akkarr.online

odevillage.fit

yaignav.site

191u.us

misionartv.store

leadingpastor.com

claudio-vega.store

9mck753.com

system-reminder.live

landsharesfg.net

lmcsf.top

mkstoreacesse.com

2023.domains

yb8.mobi

2q02f4fyxg7ybb18.digital

logtray.shop

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Formbook payload 3 IoCs
  • Blocklisted process makes network request 5 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops startup file 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1264
    • C:\Windows\system32\wscript.exe
      wscript.exe C:\Users\Admin\AppData\Local\Temp\Quote.js
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1140
      • C:\Windows\System32\wscript.exe
        "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\VeuzKgGKjI.js"
        3⤵
        • Blocklisted process makes network request
        • Drops startup file
        PID:268
      • C:\Users\Admin\AppData\Local\Temp\bin.exe
        "C:\Users\Admin\AppData\Local\Temp\bin.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Windows\SysWOW64\rundll32.exe
          "C:\Windows\SysWOW64\rundll32.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1136
          • C:\Windows\SysWOW64\cmd.exe
            /c del "C:\Users\Admin\AppData\Local\Temp\bin.exe"
            5⤵
              PID:2028

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bin.exe
      Filesize

      185KB

      MD5

      d3ac8e00dd791752d47327d53cdb2515

      SHA1

      5f820ebe7772a56d71096356443b858ae0b52276

      SHA256

      e3bdaf1daee2ad35479c213122391cb3d27f193896aef414ce6edb516c0133aa

      SHA512

      4f181b863e792212507b48374b232ccffa0528a915f3f41529205a3da5c6ce2c8063ad50b57f5ec2bb0e1126eb4d2ab9eb34036d014d633c0eecf3771fff3579

    • C:\Users\Admin\AppData\Local\Temp\bin.exe
      Filesize

      185KB

      MD5

      d3ac8e00dd791752d47327d53cdb2515

      SHA1

      5f820ebe7772a56d71096356443b858ae0b52276

      SHA256

      e3bdaf1daee2ad35479c213122391cb3d27f193896aef414ce6edb516c0133aa

      SHA512

      4f181b863e792212507b48374b232ccffa0528a915f3f41529205a3da5c6ce2c8063ad50b57f5ec2bb0e1126eb4d2ab9eb34036d014d633c0eecf3771fff3579

    • C:\Users\Admin\AppData\Roaming\VeuzKgGKjI.js
      Filesize

      5KB

      MD5

      3c661d811eda2031bebf350dc0f16603

      SHA1

      75ef6bda3f82dd858b1a4b768f24189aa10b94f1

      SHA256

      c15eb52fe816bba6b41b2bec0c7f7e08d6e2dfefff39201bc36f6b4e6fd711b8

      SHA512

      b66e03028f723307382092fe3d9683c8599a0227f50d46839ec70f6479c38af05514136c22e5cc03d72e2923384b08aebd699c9f0dfe92b738e667f306e4eb4f

    • memory/268-55-0x0000000000000000-mapping.dmp
    • memory/1136-70-0x0000000000090000-0x00000000000BF000-memory.dmp
      Filesize

      188KB

    • memory/1136-66-0x0000000075DF1000-0x0000000075DF3000-memory.dmp
      Filesize

      8KB

    • memory/1136-73-0x00000000009A0000-0x0000000000A34000-memory.dmp
      Filesize

      592KB

    • memory/1136-71-0x0000000002240000-0x0000000002543000-memory.dmp
      Filesize

      3.0MB

    • memory/1136-69-0x0000000000340000-0x000000000034E000-memory.dmp
      Filesize

      56KB

    • memory/1136-65-0x0000000000000000-mapping.dmp
    • memory/1140-54-0x000007FEFC201000-0x000007FEFC203000-memory.dmp
      Filesize

      8KB

    • memory/1264-72-0x0000000004F40000-0x000000000501B000-memory.dmp
      Filesize

      876KB

    • memory/1264-64-0x0000000004F40000-0x000000000501B000-memory.dmp
      Filesize

      876KB

    • memory/1264-62-0x0000000006CF0000-0x0000000006E49000-memory.dmp
      Filesize

      1.3MB

    • memory/1264-74-0x0000000006B80000-0x0000000006C68000-memory.dmp
      Filesize

      928KB

    • memory/1264-75-0x0000000006B80000-0x0000000006C68000-memory.dmp
      Filesize

      928KB

    • memory/1924-57-0x0000000000000000-mapping.dmp
    • memory/1924-63-0x00000000002C0000-0x00000000002D5000-memory.dmp
      Filesize

      84KB

    • memory/1924-60-0x00000000007C0000-0x0000000000AC3000-memory.dmp
      Filesize

      3.0MB

    • memory/1924-61-0x0000000000130000-0x0000000000145000-memory.dmp
      Filesize

      84KB

    • memory/2028-68-0x0000000000000000-mapping.dmp