Analysis

  • max time kernel
    169s
  • max time network
    212s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    28-11-2022 16:24

General

  • Target

    Advice Ref SCA1Sv2.exe

  • Size

    1.0MB

  • MD5

    36cffbbe00ff9dd2a5c813d43dc2749b

  • SHA1

    80a003e052f3cdc9bd10803882c198684bff8574

  • SHA256

    97a6db96fa0467a8cbe068fe3b09b0c03c2be85e2902503464e3af90e4e80af1

  • SHA512

    b417c23df1a8c0fa2860d59d6886230b4648f66eb4ba269cc2514570a0f8b3bbee4cd653b0543ef3b07a02b6c52c657665303add260b6c1093e277a990ba089e

  • SSDEEP

    12288:WU2EIn2uWBQmER9Ai2flfLO/caYVT/XG4Vcfe+y/qv2q7KqRmZ4dUpkD0bxMMJPc:WRWBQLKNkcfvHcfe+y/qvjG7xMMJ1q

Malware Config

Extracted

Family

formbook

Campaign

8ch8

Decoy

EpMcJgRhXLgnbGVS1w==

PT1CWj241lPTuYLqz4cMQug=

iW5zo5XTlCyvPyc0hZ+/Ww==

3TiaoYnZM2R/2Jxzj/YY/wSb

gmIzUUXL9Y9CJH1OhZ+/Ww==

TdhX816H2NfWDDA8zg==

hrO4y8wSaEd20IZmhZ+/Ww==

hpV3JYmIC104sSI=

OO5xgWfn6pzCBp3kOas=

wJJtjXKWWuN0B4D/Zq+h+MJnVA==

cG5OST1xygeTEXTwN+gtU+o=

DEkjtjWwSl04sSI=

4jIoyEKj+0h76T8=

CBgIFRBAneBly2N666Yv0uI=

q7/M5ri8J104sSI=

X3FOWUW6vIeYk2QMLPV/GR/KuJlO71Nn

Pk5Xbmm7K2oM390ILKE=

AJLzkApAgKHYDDA8zg==

Z1BN4jzHtGx8ZiKO2DMnznIiArHLh6E=

1WnEWMU1nd7aSQ==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Users\Admin\AppData\Local\Temp\Advice Ref SCA1Sv2.exe
      "C:\Users\Admin\AppData\Local\Temp\Advice Ref SCA1Sv2.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Users\Admin\AppData\Local\Temp\Advice Ref SCA1Sv2.exe
        "C:\Users\Admin\AppData\Local\Temp\Advice Ref SCA1Sv2.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2028
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1032
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1416

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      932KB

      MD5

      661fd92d4eaeea3740649af5a484d7c8

      SHA1

      c93f868890fee1475f8ec9e7607e26f5dce67d54

      SHA256

      58a478f0560ea22c1bc194263f07cf6f3ecfe47d0c8b534a7bba185f28a1141f

      SHA512

      1fac03c20139fde41d121e0adbd02d127261ce061509996087fc1c80baf2fe0d0f70fed6b83d38a85cfa2e07d038ff809161c7ecce31ec44ac8b89740d3db15d

    • memory/1032-79-0x00000000022B0000-0x00000000025B3000-memory.dmp

      Filesize

      3.0MB

    • memory/1032-80-0x00000000025C0000-0x000000000264F000-memory.dmp

      Filesize

      572KB

    • memory/1032-77-0x00000000003E0000-0x0000000000661000-memory.dmp

      Filesize

      2.5MB

    • memory/1032-72-0x0000000000000000-mapping.dmp

    • memory/1032-82-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/1032-78-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/1032-76-0x0000000075331000-0x0000000075333000-memory.dmp

      Filesize

      8KB

    • memory/1144-59-0x0000000005F40000-0x0000000005FAE000-memory.dmp

      Filesize

      440KB

    • memory/1144-55-0x00000000763F1000-0x00000000763F3000-memory.dmp

      Filesize

      8KB

    • memory/1144-56-0x0000000000350000-0x0000000000366000-memory.dmp

      Filesize

      88KB

    • memory/1144-54-0x00000000013B0000-0x00000000014BE000-memory.dmp

      Filesize

      1.1MB

    • memory/1144-58-0x00000000080B0000-0x0000000008156000-memory.dmp

      Filesize

      664KB

    • memory/1144-57-0x00000000003C0000-0x00000000003CE000-memory.dmp

      Filesize

      56KB

    • memory/1256-84-0x0000000006A90000-0x0000000006C0F000-memory.dmp

      Filesize

      1.5MB

    • memory/1256-81-0x0000000006A90000-0x0000000006C0F000-memory.dmp

      Filesize

      1.5MB

    • memory/1256-71-0x0000000004980000-0x0000000004A62000-memory.dmp

      Filesize

      904KB

    • memory/2028-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2028-75-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2028-74-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2028-70-0x0000000000120000-0x0000000000130000-memory.dmp

      Filesize

      64KB

    • memory/2028-69-0x0000000000990000-0x0000000000C93000-memory.dmp

      Filesize

      3.0MB

    • memory/2028-67-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/2028-66-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2028-64-0x00000000004012B0-mapping.dmp

    • memory/2028-63-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2028-61-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB