Analysis

  • max time kernel
    628s
  • max time network
    433s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    30-11-2022 05:43

General

  • Target

    ewe.exe

  • Size

    947KB

  • MD5

    b39bb6d5236d059f15e0c303119ac2ac

  • SHA1

    169bbde66c91ec403e5378e3af49b7e038739a59

  • SHA256

    bab8c0c9b3c3cebaa6f32565eadd1733308973fade84142c07bb1d5608fc6a0c

  • SHA512

    c64992edf997a67981a1a8fa59176c1b8430668f31f86af546196e2944e477e8ff89ea298ccbc9b0cd4e7e5b5fd40f4f616b838c6e75e493854c5af6a545183c

  • SSDEEP

    6144:CE0WCLnQX46PiAdNF5miUfnKk7gDaKIUzjmVqJE9/UxaGHXvI1N7nRl3kgbIpxC3:8WCLQIClF5mHKQSdiqosaG/8NpDAds

Malware Config

Extracted

Family

formbook

Campaign

dcn0

Decoy

ZVx68vDtAMBCwg==

oBMBvsNORkM/O/ox

Ff9pISWkm6eG4lByIspp

c2T42c6CIIF6B8xTxm9XzpVw

bvjhxRbnAC183w==

0lTttSNG4HUDNflyIspp

hPXFlstqiHA/O/ox

WLR+MeerxZ0cNn1ja+IQAYo=

IHRn4xXOVKi477zarG+ObSy7YJA=

Xhf3e+tdAC183w==

Xk0ZAezv2rWH

kngo+vBeSRN7AszNwam3Osmguuqc0MoC

a2Qp7a+E8fSw7LDjpnqEKjsRZA==

3zjy4E7+QM48wg==

YcCmqT3OUNAigVott2pBKiy7YJA=

4+SMeX1juat/5cZ1AZihcyy7YJA=

/+m7sro0OBTl3TMpCw==

i2ctEfe4//a64yklMsgS2J90

+loZ2QKGX0UWgpvErMs=

b9BNCnJWQJS8IfsR0uR3bCy7YJA=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1220
    • C:\Users\Admin\AppData\Local\Temp\ewe.exe
      "C:\Users\Admin\AppData\Local\Temp\ewe.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1324
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c ping 127.0.0.1 -n 39 > nul && REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe,"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1580
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 39
          4⤵
          • Runs ping.exe
          PID:1240
        • C:\Windows\SysWOW64\reg.exe
          REG ADD "HKCU\Software\Microsoft\Windows NT\CurrentVersion\Winlogon" /f /v "Shell" /t REG_SZ /d "explorer.exe,C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe,"
          4⤵
          • Modifies WinLogon for persistence
          PID:840
      • C:\Windows\SysWOW64\cmd.exe
        "cmd" /c ping 127.0.0.1 -n 44 > nul && copy "C:\Users\Admin\AppData\Local\Temp\ewe.exe" "C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe" && ping 127.0.0.1 -n 44 > nul && "C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe"
        3⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:520
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 44
          4⤵
          • Runs ping.exe
          PID:976
        • C:\Windows\SysWOW64\PING.EXE
          ping 127.0.0.1 -n 44
          4⤵
          • Runs ping.exe
          PID:980
        • C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe
          "C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1632
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInProcess32.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:572
    • C:\Windows\SysWOW64\cmmon32.exe
      "C:\Windows\SysWOW64\cmmon32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1664

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe
    Filesize

    947KB

    MD5

    b39bb6d5236d059f15e0c303119ac2ac

    SHA1

    169bbde66c91ec403e5378e3af49b7e038739a59

    SHA256

    bab8c0c9b3c3cebaa6f32565eadd1733308973fade84142c07bb1d5608fc6a0c

    SHA512

    c64992edf997a67981a1a8fa59176c1b8430668f31f86af546196e2944e477e8ff89ea298ccbc9b0cd4e7e5b5fd40f4f616b838c6e75e493854c5af6a545183c

  • C:\Users\Admin\AppData\Roaming\Mircca\ogaru.exe
    Filesize

    947KB

    MD5

    b39bb6d5236d059f15e0c303119ac2ac

    SHA1

    169bbde66c91ec403e5378e3af49b7e038739a59

    SHA256

    bab8c0c9b3c3cebaa6f32565eadd1733308973fade84142c07bb1d5608fc6a0c

    SHA512

    c64992edf997a67981a1a8fa59176c1b8430668f31f86af546196e2944e477e8ff89ea298ccbc9b0cd4e7e5b5fd40f4f616b838c6e75e493854c5af6a545183c

  • \Users\Admin\AppData\Roaming\Mircca\ogaru.exe
    Filesize

    947KB

    MD5

    b39bb6d5236d059f15e0c303119ac2ac

    SHA1

    169bbde66c91ec403e5378e3af49b7e038739a59

    SHA256

    bab8c0c9b3c3cebaa6f32565eadd1733308973fade84142c07bb1d5608fc6a0c

    SHA512

    c64992edf997a67981a1a8fa59176c1b8430668f31f86af546196e2944e477e8ff89ea298ccbc9b0cd4e7e5b5fd40f4f616b838c6e75e493854c5af6a545183c

  • memory/520-60-0x0000000000000000-mapping.dmp
  • memory/572-83-0x0000000000080000-0x0000000000090000-memory.dmp
    Filesize

    64KB

  • memory/572-80-0x0000000000401000-0x000000000042E000-memory.dmp
    Filesize

    180KB

  • memory/572-86-0x0000000000422000-0x0000000000424000-memory.dmp
    Filesize

    8KB

  • memory/572-75-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/572-73-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/572-82-0x0000000000422000-0x0000000000424000-memory.dmp
    Filesize

    8KB

  • memory/572-87-0x00000000002A0000-0x00000000002B0000-memory.dmp
    Filesize

    64KB

  • memory/572-81-0x0000000000880000-0x0000000000B83000-memory.dmp
    Filesize

    3.0MB

  • memory/572-90-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/572-91-0x0000000000401000-0x000000000042E000-memory.dmp
    Filesize

    180KB

  • memory/572-76-0x00000000004012B0-mapping.dmp
  • memory/572-79-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/572-78-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/572-72-0x0000000000400000-0x000000000042E000-memory.dmp
    Filesize

    184KB

  • memory/840-62-0x0000000000000000-mapping.dmp
  • memory/976-61-0x0000000000000000-mapping.dmp
  • memory/980-63-0x0000000000000000-mapping.dmp
  • memory/1220-88-0x0000000005020000-0x00000000050DD000-memory.dmp
    Filesize

    756KB

  • memory/1220-84-0x0000000004CF0000-0x0000000004E22000-memory.dmp
    Filesize

    1.2MB

  • memory/1240-59-0x0000000000000000-mapping.dmp
  • memory/1324-57-0x0000000000700000-0x0000000000718000-memory.dmp
    Filesize

    96KB

  • memory/1324-55-0x0000000075A11000-0x0000000075A13000-memory.dmp
    Filesize

    8KB

  • memory/1324-54-0x0000000000350000-0x0000000000442000-memory.dmp
    Filesize

    968KB

  • memory/1324-56-0x0000000000520000-0x0000000000550000-memory.dmp
    Filesize

    192KB

  • memory/1580-58-0x0000000000000000-mapping.dmp
  • memory/1632-65-0x0000000000000000-mapping.dmp
  • memory/1632-68-0x0000000001210000-0x0000000001302000-memory.dmp
    Filesize

    968KB

  • memory/1632-71-0x0000000000700000-0x0000000000706000-memory.dmp
    Filesize

    24KB

  • memory/1632-70-0x0000000000B70000-0x0000000000B8A000-memory.dmp
    Filesize

    104KB

  • memory/1664-89-0x0000000000000000-mapping.dmp
  • memory/1664-92-0x0000000000710000-0x000000000071D000-memory.dmp
    Filesize

    52KB

  • memory/1664-93-0x0000000000080000-0x00000000000AD000-memory.dmp
    Filesize

    180KB

  • memory/1664-94-0x0000000002110000-0x0000000002413000-memory.dmp
    Filesize

    3.0MB

  • memory/1664-95-0x0000000000660000-0x00000000006EF000-memory.dmp
    Filesize

    572KB

  • memory/1664-96-0x0000000000080000-0x00000000000AD000-memory.dmp
    Filesize

    180KB