Analysis

  • max time kernel
    193s
  • max time network
    208s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 08:24

General

  • Target

    75487358663f47e70846be7ae195c335bb35cbe469c93503f537e75855082f01.exe

  • Size

    253KB

  • MD5

    6c47810c50e5d51c52010f6497b192cc

  • SHA1

    46c1da4c046006d84a306b824e2f9f65a034e389

  • SHA256

    75487358663f47e70846be7ae195c335bb35cbe469c93503f537e75855082f01

  • SHA512

    ab56561a813a1730a63c3d474178d7a0d57394979eb8d5babd98742a3556f4805b88e13c505dbf5169740cc0a3dbffb994b58284d9343f64d835042299e8bbcf

  • SSDEEP

    6144:xBnQPEBXJ9LLlsp1mjwi2OsedFcBzX1GuW5uC1O:8P4Zc1Ow5eTcBbAn5u3

Malware Config

Extracted

Family

formbook

Campaign

olus

Decoy

lFwthdzYgacRjF3H

V0HcUpvjRfyxLCVc/Qu1

fVMwe8B1QkymDetjpI9uzecX

QgKu/wmjhaT79V7jTK/HjhUCywqs3TQ=

21I9i5OSAoodam1rOQ==

QCVAvA3e02NvjlzP

khZ3sq8WGuiMAg==

K+U9rwDkZhi7

Uii7NZQ3FCKY+7Agf4JuzecX

nWYwbrNxWOGgJCNc/Qu1

yxFqsrsU9YyQnUJ4pMtHWw==

H+pDjL3qLrqbfeQYPlmASHc2eg==

OKO55xmvnyzvSF1uS5I=

VT4daWvLpsxvjlzP

SaUHe81zYnTzcTZc/Qu1

Df2M0dtCH1sGvxA5Jw==

NAsWerPSMayThrruHxHdjjUqeA==

+Nxhp7kZ4v7L+nvFkI0=

KhEcfId5vUQQezJiSbvWaZrdJmg=

9aEE7WN4555vjlzP

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2032
    • C:\Users\Admin\AppData\Local\Temp\75487358663f47e70846be7ae195c335bb35cbe469c93503f537e75855082f01.exe
      "C:\Users\Admin\AppData\Local\Temp\75487358663f47e70846be7ae195c335bb35cbe469c93503f537e75855082f01.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4504
      • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
        "C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe" C:\Users\Admin\AppData\Local\Temp\pwpwushk.h
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2372
        • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe
          "C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe" C:\Users\Admin\AppData\Local\Temp\pwpwushk.h
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4356
          • C:\Windows\SysWOW64\systray.exe
            "C:\Windows\SysWOW64\systray.exe"
            5⤵
            • Suspicious use of SetThreadContext
            • Modifies Internet Explorer settings
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:3952
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              6⤵
                PID:1708
      • C:\Windows\SysWOW64\raserver.exe
        "C:\Windows\SysWOW64\raserver.exe"
        2⤵
          PID:3628

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\pwpwushk.h

        Filesize

        5KB

        MD5

        2be139593e0b3fadf40d783a5a82e4fe

        SHA1

        78f5fe723b55100566cf7c13870262df7074a137

        SHA256

        14f4254ad6ded053edb5cf633ac3d9ae6cba67eac00cb007b0bb84cdb50333f5

        SHA512

        6938c2db0dc7e2041cc4e45b2b5a521ff9a2181f9934d9ae3984b8fdb688cef4b7b5a45a4f53f6f62383cf94657cdd260c71b82b58dd4a06f7203b2417c3df69

      • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe

        Filesize

        46KB

        MD5

        27541d5316db05b650ab973fd2aec842

        SHA1

        ec706f8d9bced58fff747022891c64b6a2148d2f

        SHA256

        720ea640a85baea2835b01c5a6819dd7a129f97e5d4049b63f07b4e007eb8298

        SHA512

        ad0e19c92fd8f8e4025ae82a2b3caf89501f2a8e3073c910bf100a8a3c06fb1f62ea955e92dab23350ab7f92420c704740c2baba8782a923b7025f93b06dab73

      • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe

        Filesize

        46KB

        MD5

        27541d5316db05b650ab973fd2aec842

        SHA1

        ec706f8d9bced58fff747022891c64b6a2148d2f

        SHA256

        720ea640a85baea2835b01c5a6819dd7a129f97e5d4049b63f07b4e007eb8298

        SHA512

        ad0e19c92fd8f8e4025ae82a2b3caf89501f2a8e3073c910bf100a8a3c06fb1f62ea955e92dab23350ab7f92420c704740c2baba8782a923b7025f93b06dab73

      • C:\Users\Admin\AppData\Local\Temp\vwwufokaj.exe

        Filesize

        46KB

        MD5

        27541d5316db05b650ab973fd2aec842

        SHA1

        ec706f8d9bced58fff747022891c64b6a2148d2f

        SHA256

        720ea640a85baea2835b01c5a6819dd7a129f97e5d4049b63f07b4e007eb8298

        SHA512

        ad0e19c92fd8f8e4025ae82a2b3caf89501f2a8e3073c910bf100a8a3c06fb1f62ea955e92dab23350ab7f92420c704740c2baba8782a923b7025f93b06dab73

      • C:\Users\Admin\AppData\Local\Temp\xkypvuq.ifm

        Filesize

        185KB

        MD5

        f3a22ba1cff1d318f4c25580b7976980

        SHA1

        e7a12c3c666f36ee7b3417ca4800b8a5463e39a7

        SHA256

        58eb30235dea07294d733f1da23c47726bf0195cea4cd271096205bbb348715f

        SHA512

        efd1e1ff8269bdf0fddd020a536e9f26d58d331348b3b9763803069f3213aa5b6f913697735dc3cc0ffad49f666eaf3b2a261e0e874d19805ffb3483a32cb68f

      • memory/2032-186-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

        Filesize

        64KB

      • memory/2032-143-0x0000000008AC0000-0x0000000008BE4000-memory.dmp

        Filesize

        1.1MB

      • memory/2032-206-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/2032-205-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/2032-204-0x0000000002CE0000-0x0000000002CF0000-memory.dmp

        Filesize

        64KB

      • memory/2032-172-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-203-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/2032-202-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/2032-145-0x0000000008D40000-0x0000000008ED2000-memory.dmp

        Filesize

        1.6MB

      • memory/2032-200-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-173-0x0000000007AA0000-0x0000000007AB0000-memory.dmp

        Filesize

        64KB

      • memory/2032-201-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/2032-199-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-198-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-151-0x0000000008D40000-0x0000000008ED2000-memory.dmp

        Filesize

        1.6MB

      • memory/2032-197-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-153-0x0000000008670000-0x00000000087B5000-memory.dmp

        Filesize

        1.3MB

      • memory/2032-196-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-155-0x0000000008670000-0x00000000087B5000-memory.dmp

        Filesize

        1.3MB

      • memory/2032-156-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-157-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-158-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-159-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-160-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-161-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-162-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-163-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-164-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-165-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-171-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-167-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-168-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-169-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-170-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-166-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-195-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-194-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-174-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

        Filesize

        64KB

      • memory/2032-175-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

        Filesize

        64KB

      • memory/2032-176-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

        Filesize

        64KB

      • memory/2032-177-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

        Filesize

        64KB

      • memory/2032-178-0x0000000007AC0000-0x0000000007AD0000-memory.dmp

        Filesize

        64KB

      • memory/2032-179-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-180-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-181-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-182-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-183-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-184-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-185-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-193-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-187-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-188-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-189-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-190-0x0000000002CF0000-0x0000000002D00000-memory.dmp

        Filesize

        64KB

      • memory/2032-191-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2032-192-0x0000000003080000-0x0000000003090000-memory.dmp

        Filesize

        64KB

      • memory/2372-132-0x0000000000000000-mapping.dmp

      • memory/3952-148-0x0000000000B00000-0x0000000000B06000-memory.dmp

        Filesize

        24KB

      • memory/3952-154-0x0000000000DA0000-0x0000000000DCD000-memory.dmp

        Filesize

        180KB

      • memory/3952-152-0x0000000002D30000-0x0000000002DBF000-memory.dmp

        Filesize

        572KB

      • memory/3952-147-0x0000000000000000-mapping.dmp

      • memory/3952-149-0x0000000000DA0000-0x0000000000DCD000-memory.dmp

        Filesize

        180KB

      • memory/3952-150-0x0000000002FF0000-0x000000000333A000-memory.dmp

        Filesize

        3.3MB

      • memory/4356-137-0x0000000000000000-mapping.dmp

      • memory/4356-146-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4356-144-0x0000000000A20000-0x0000000000A30000-memory.dmp

        Filesize

        64KB

      • memory/4356-142-0x0000000000670000-0x0000000000680000-memory.dmp

        Filesize

        64KB

      • memory/4356-141-0x0000000000AE0000-0x0000000000E2A000-memory.dmp

        Filesize

        3.3MB

      • memory/4356-140-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/4356-139-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB