Analysis

  • max time kernel
    150s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-11-2022 11:47

General

  • Target

    Copie a bonului de plata.exe

  • Size

    733KB

  • MD5

    eb8c68c29d6131d6b903dd268d6ff0ef

  • SHA1

    61dfb557d2e792229060bdeb21285f65daf48492

  • SHA256

    d1798c288b296009d8049ca5364b29b079d59fadc870af65e92fe5fa23bdcec5

  • SHA512

    077a05f65709382d70c1fed0836125854ae56802eb2bbfe3d3b1ecd1958f9f3c35dfaa8c91058ba6248b15e4bdd8c3a35aff8d20f302996609b0d0cae9b51fad

  • SSDEEP

    12288:i1qMhtVLzLypCggIh36+O9dvjpQVeri4O2qKk/RqIkr:WFhHzmQgn6+8T/r7JaqI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

3nop

Decoy

slot999.site

hagsahoy.com

howdyart.com

orders-marketplace.com

ranaa.email

masterlink.guru

archershut.com

weikumcommunications.com

dphardmoney.com

shjyutie.com

vivaberlin.net

mycto.today

curvygirlugc.com

otnmp.cfd

alwrists.com

propercandlecompany.com

allindustry-bg.com

theyoungbizacademy.com

expand658170.com

leslainesdumouchon.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Formbook payload 2 IoCs
  • ModiLoader Second Stage 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\Copie a bonului de plata.exe
      "C:\Users\Admin\AppData\Local\Temp\Copie a bonului de plata.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1612
      • C:\Windows\SysWOW64\wscript.exe
        C:\Windows\System32\wscript.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2188
    • C:\Windows\SysWOW64\WWAHost.exe
      "C:\Windows\SysWOW64\WWAHost.exe"
      2⤵
        PID:3712

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1612-132-0x00000000022B0000-0x00000000022DB000-memory.dmp
      Filesize

      172KB

    • memory/1612-135-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/1612-136-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/2188-134-0x0000000000000000-mapping.dmp
    • memory/2188-138-0x0000000003FA0000-0x00000000042EA000-memory.dmp
      Filesize

      3.3MB

    • memory/2188-139-0x0000000003E90000-0x0000000003EA5000-memory.dmp
      Filesize

      84KB

    • memory/2188-141-0x0000000010410000-0x000000001043F000-memory.dmp
      Filesize

      188KB

    • memory/2440-140-0x0000000007D70000-0x0000000007EA0000-memory.dmp
      Filesize

      1.2MB