Analysis

  • max time kernel
    174s
  • max time network
    188s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30-11-2022 15:46

General

  • Target

    579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9.exe

  • Size

    1.6MB

  • MD5

    9f9ff2c8998e81058d583369b7a496de

  • SHA1

    8fc0b5f4d6100e438fc734eb2082ba237efe0652

  • SHA256

    579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9

  • SHA512

    98235d57d8395d89e9da377a48129aaf97640ea4fdddae65c4b5e1ae330d4b6911272ac953284fa8e752e28e3e0075b0dc153393c587c9a04ac24ac5481697bc

  • SSDEEP

    12288:8WHyGfJqDJLZCpzeCptoDFjmjRPTjRPyjBjjijBjBjBjBjLjVA7nNi6HCZoU9+kw:rqqNeK2DgA7nNxCZLYHkgiPgp

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

2kf

Decoy

edmondscakes.com

doublewldr.online

tickets2usa.com

heyhxry.com

weightloss-gulfport.com

prosselius.com

newviewroofers.com

jacksonarearealestate.com

catparkas.xyz

pagos2020.com

sonwsefjrahi.online

franchisethings.com

nuocvietngaynay.com

sohelvai.com

mikeyroush.com

lamesaroofing.com

betbigo138.com

amazon-service-recovery.com

clockin.net

riostrader.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 1 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9.exe
    "C:\Users\Admin\AppData\Local\Temp\579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4184
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\puJzcbEe" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF1FC.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1124
    • C:\Users\Admin\AppData\Local\Temp\579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9.exe
      "C:\Users\Admin\AppData\Local\Temp\579d13f3cd7acab8f6b9711c99fef396a325efad3a11a6cccb261437af1619a9.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:1852

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmpF1FC.tmp

    Filesize

    1KB

    MD5

    7140038e1daf76f1a60c1bd0128cc38d

    SHA1

    8de585edf6cd88386a1dca0729e910e78e9629f2

    SHA256

    ec8b65900d5cd94d28b5f02374996b2d994f4c0e0cbf97ca8aed2ce030443e6f

    SHA512

    342c3a3769d2cf7dcf7da29ef3e0533e012176957d74f4f92d62bacc62367cedc5f104f5c7703e8eafbaf678ddf9ea9e7cc6450e1188b70149cea65f72328d72

  • memory/1124-138-0x0000000000000000-mapping.dmp

  • memory/1852-140-0x0000000000000000-mapping.dmp

  • memory/1852-141-0x0000000000400000-0x000000000042E000-memory.dmp

    Filesize

    184KB

  • memory/1852-142-0x00000000018B0000-0x0000000001BFA000-memory.dmp

    Filesize

    3.3MB

  • memory/4184-132-0x00000000001B0000-0x0000000000358000-memory.dmp

    Filesize

    1.7MB

  • memory/4184-133-0x00000000071B0000-0x000000000724C000-memory.dmp

    Filesize

    624KB

  • memory/4184-134-0x0000000007800000-0x0000000007DA4000-memory.dmp

    Filesize

    5.6MB

  • memory/4184-135-0x00000000072F0000-0x0000000007382000-memory.dmp

    Filesize

    584KB

  • memory/4184-136-0x0000000007280000-0x000000000728A000-memory.dmp

    Filesize

    40KB

  • memory/4184-137-0x0000000007480000-0x00000000074D6000-memory.dmp

    Filesize

    344KB