Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    01-12-2022 08:30

General

  • Target

    PROFORMA INVOICE 103321.exe

  • Size

    916KB

  • MD5

    6b34c7d21457240410f7526870fb3cc8

  • SHA1

    ad4f885afeefe8d5c06f8ed14736705fb0b527f1

  • SHA256

    4e299e221bff547ce81f39f447b914d120e8411bd4d38a5cf7014e5241e757ad

  • SHA512

    1a8a7160adf1acea7cd76a7b739129f95afe931d9e5544d874e20d7f9c330c297618cb1f7cb69ced06fa22aaf95ef68dbf1df1e6898143061c8c360b3b48b61e

  • SSDEEP

    12288:2ZMBqPwNK7sb7/sn1gSp4JZjAH1wBjGrCwDBo6RU2snF90NcZnbhR9jqI:he7w7En1gSp4TjQw5+CCrKFSNYbX9jn

Malware Config

Extracted

Family

formbook

Campaign

d8ax

Decoy

wQDD4HkJc+vErnk=

j7vdn039QTY5Gcs43SDb8R4gwLgFCI7s

ZqPN0enMl4As

kKK00fOMq6KZmHv6kZjEiTm3l1o=

CxCTti/0Dcs5qly/AVHoTg==

5TwVtD3wcevErnk=

/ieoWNXMl4As

caK67QvHGhmiEuKpidX2RA==

Bbyy3J6D1Qw=

LV5N2gOocvpbA/OB/w==

k7k2OMNsBY67libDOi4=

wuDokhS1jLo4mA==

RVGz6anMl4As

la40BCHFwoI/rpugbdoaWQ==

XmVnfY0nNACG5si5u8Ds6F79xw==

dpyQTuytl0/bShsFIYUaHRzIL4quYwxgTA==

yvmesDDPpTSrLhf5GlvvdaCZekhAsg==

obTEXhervaSWkSbDOi4=

ClZogXcOT1DcPyvgOKJM

Drlokv/cjLo4mA==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe
      "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1600
      • C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe
        "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:952
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1716
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:616

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll
      Filesize

      927KB

      MD5

      7fd80b1cc72dc580c02ca4cfbfb2592d

      SHA1

      18da905af878b27151b359cf1a7d0a650764e8a1

      SHA256

      1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

      SHA512

      13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

    • memory/952-68-0x0000000000401000-0x000000000042E000-memory.dmp
      Filesize

      180KB

    • memory/952-64-0x00000000004012B0-mapping.dmp
    • memory/952-69-0x00000000009C0000-0x0000000000CC3000-memory.dmp
      Filesize

      3.0MB

    • memory/952-70-0x0000000000422000-0x0000000000424000-memory.dmp
      Filesize

      8KB

    • memory/952-60-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/952-61-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/952-71-0x00000000001E0000-0x00000000001F0000-memory.dmp
      Filesize

      64KB

    • memory/952-63-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/952-66-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/952-67-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/1232-81-0x0000000006510000-0x00000000065E7000-memory.dmp
      Filesize

      860KB

    • memory/1232-78-0x0000000006510000-0x00000000065E7000-memory.dmp
      Filesize

      860KB

    • memory/1232-72-0x0000000002970000-0x0000000002A56000-memory.dmp
      Filesize

      920KB

    • memory/1600-59-0x00000000047E0000-0x0000000004814000-memory.dmp
      Filesize

      208KB

    • memory/1600-56-0x00000000005C0000-0x00000000005D6000-memory.dmp
      Filesize

      88KB

    • memory/1600-57-0x0000000000780000-0x000000000078E000-memory.dmp
      Filesize

      56KB

    • memory/1600-54-0x00000000008D0000-0x00000000009BA000-memory.dmp
      Filesize

      936KB

    • memory/1600-58-0x0000000004870000-0x00000000048E0000-memory.dmp
      Filesize

      448KB

    • memory/1600-55-0x0000000076461000-0x0000000076463000-memory.dmp
      Filesize

      8KB

    • memory/1716-73-0x0000000000000000-mapping.dmp
    • memory/1716-74-0x0000000000850000-0x0000000000859000-memory.dmp
      Filesize

      36KB

    • memory/1716-75-0x00000000000D0000-0x00000000000FD000-memory.dmp
      Filesize

      180KB

    • memory/1716-76-0x0000000002220000-0x0000000002523000-memory.dmp
      Filesize

      3.0MB

    • memory/1716-77-0x0000000001DF0000-0x0000000001E7F000-memory.dmp
      Filesize

      572KB

    • memory/1716-79-0x00000000000D0000-0x00000000000FD000-memory.dmp
      Filesize

      180KB