Analysis

  • max time kernel
    179s
  • max time network
    205s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-11-2022 17:42

General

  • Target

    be8e8f4846b6b166d049c45dba8a91323aac80bc6fb01889de7f99442a577e1a.exe

  • Size

    272KB

  • MD5

    f2455fcb7954e649589e7406fd5acc97

  • SHA1

    2532f710ed4ee7bae1be0f8726b4d599fda03973

  • SHA256

    be8e8f4846b6b166d049c45dba8a91323aac80bc6fb01889de7f99442a577e1a

  • SHA512

    b3ad6211317fa9159adb8a0a9a2486d091bc56bce288a0843005a90e761f4832d34b60ee28b5fd2c5b4bac5ac2962c144051de99f264bc4d2f6311bfb7711e5a

  • SSDEEP

    6144:QBn1e3XWMCcAYtE3R0n0OZL/mS3SnBLOag9YMHLcxzcsc:goGaAYt4OrgO5Zcxzcsc

Malware Config

Extracted

Family

formbook

Campaign

henz

Decoy

IxWMb+jVsoinShuZJzk=

TPfKgQZ//oGnKr/J

EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M

KebSmiCP9p8yUw==

HAt/ljkEuqMLHOLCi53Pv8MKX9qk

CY4ogZTwJc4vSw==

WWDIx5UYUDyepntE0YIAPca3/rI=

+Pkr01Lfb2rME7bL

S5nyK0p8jS2xdwQ=

W/oqvlO57LfkLcLHnQ==

zrrwtqkTLwxulm4l8FGopw==

AqucYext8bzFbOKthIm8E6gfVkUHxKY=

OfnjeDs78+RTcz4OHRl+

XKf1wwpZR5hLLjHgmUGOpQ==

JMyhSLoJPTCwn5o9zX2d8i1+

Wk54MBsDhWSVbnIRkQ==

7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==

hH/EYxN+jC2xdwQ=

S0F4ORqDjS2xdwQ=

0o/UwXnuJ+sJp0cOHRl+

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Users\Admin\AppData\Local\Temp\be8e8f4846b6b166d049c45dba8a91323aac80bc6fb01889de7f99442a577e1a.exe
      "C:\Users\Admin\AppData\Local\Temp\be8e8f4846b6b166d049c45dba8a91323aac80bc6fb01889de7f99442a577e1a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4908
      • C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe
        "C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe" C:\Users\Admin\AppData\Local\Temp\qnhjmzefy.uas
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1968
        • C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe
          "C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe" C:\Users\Admin\AppData\Local\Temp\qnhjmzefy.uas
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3516
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3192
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:4968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe
      Filesize

      122KB

      MD5

      36acfdb1046bd68aa0e6cc2ab4e4c3bd

      SHA1

      75a07369397553b78f46752b160893893188dd90

      SHA256

      06437c9f7a08d1d71708fc123595278f2f3f8bc28a1984ef0020fe982f767f99

      SHA512

      06c47082dde926e47f60acf806e273f875804a1a28bc9d4a4df050a83a93700d8234e2cc97c4e4b2327010885fa0e959d3646c8936f78a78ca27a7d023e025d6

    • C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe
      Filesize

      122KB

      MD5

      36acfdb1046bd68aa0e6cc2ab4e4c3bd

      SHA1

      75a07369397553b78f46752b160893893188dd90

      SHA256

      06437c9f7a08d1d71708fc123595278f2f3f8bc28a1984ef0020fe982f767f99

      SHA512

      06c47082dde926e47f60acf806e273f875804a1a28bc9d4a4df050a83a93700d8234e2cc97c4e4b2327010885fa0e959d3646c8936f78a78ca27a7d023e025d6

    • C:\Users\Admin\AppData\Local\Temp\eubkfbzr.exe
      Filesize

      122KB

      MD5

      36acfdb1046bd68aa0e6cc2ab4e4c3bd

      SHA1

      75a07369397553b78f46752b160893893188dd90

      SHA256

      06437c9f7a08d1d71708fc123595278f2f3f8bc28a1984ef0020fe982f767f99

      SHA512

      06c47082dde926e47f60acf806e273f875804a1a28bc9d4a4df050a83a93700d8234e2cc97c4e4b2327010885fa0e959d3646c8936f78a78ca27a7d023e025d6

    • C:\Users\Admin\AppData\Local\Temp\qnhjmzefy.uas
      Filesize

      5KB

      MD5

      5dda2bd9411b7a598e4f337c0686e569

      SHA1

      2dc7a54e3529ed07a06a736053222bed6b237409

      SHA256

      77e6fcdbbdefc770664309b65728a8a3bb8babd14dbf0f015b7f9ea7528b9db5

      SHA512

      009686dde4d5c948f297ed3cd04d5006ecbfd4546fed23315397966ac1c2b54ec0bde761cdc07e6a2be3e169412b24b5347d0e975b7a0b6250a3d32444c5f211

    • C:\Users\Admin\AppData\Local\Temp\xmbukjoz.we
      Filesize

      185KB

      MD5

      0c09d766c68972dcd4fe187342cbc6db

      SHA1

      344c9e779a1438a27218475f17a2b31d30261aa0

      SHA256

      7e1d1860d24188aa79bb14092cfdcd27d1b9f2c20ff62accc4e71c6414999ff6

      SHA512

      82257a38aced3a4fb0d7a0fa447e666a9b9e5d0bccf0320f8e34e8686289618a95ddd52bdce67a04993f09546bedccca69ad619170bf3eb9302ce4ea671c30eb

    • memory/1968-132-0x0000000000000000-mapping.dmp
    • memory/3020-143-0x0000000007800000-0x0000000007948000-memory.dmp
      Filesize

      1.3MB

    • memory/3020-153-0x0000000007950000-0x0000000007A9C000-memory.dmp
      Filesize

      1.3MB

    • memory/3020-149-0x0000000007800000-0x0000000007948000-memory.dmp
      Filesize

      1.3MB

    • memory/3020-151-0x0000000007950000-0x0000000007A9C000-memory.dmp
      Filesize

      1.3MB

    • memory/3192-152-0x0000000000780000-0x00000000007AD000-memory.dmp
      Filesize

      180KB

    • memory/3192-150-0x0000000000EC0000-0x0000000000F4F000-memory.dmp
      Filesize

      572KB

    • memory/3192-144-0x0000000000000000-mapping.dmp
    • memory/3192-148-0x0000000000FB0000-0x00000000012FA000-memory.dmp
      Filesize

      3.3MB

    • memory/3192-147-0x0000000000780000-0x00000000007AD000-memory.dmp
      Filesize

      180KB

    • memory/3192-146-0x0000000000660000-0x0000000000667000-memory.dmp
      Filesize

      28KB

    • memory/3516-137-0x0000000000000000-mapping.dmp
    • memory/3516-145-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/3516-142-0x0000000000490000-0x00000000004A0000-memory.dmp
      Filesize

      64KB

    • memory/3516-141-0x0000000000A40000-0x0000000000D8A000-memory.dmp
      Filesize

      3.3MB

    • memory/3516-140-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/3516-139-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB