Analysis

  • max time kernel
    151s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 08:30

General

  • Target

    PROFORMA INVOICE 103321.exe

  • Size

    916KB

  • MD5

    6b34c7d21457240410f7526870fb3cc8

  • SHA1

    ad4f885afeefe8d5c06f8ed14736705fb0b527f1

  • SHA256

    4e299e221bff547ce81f39f447b914d120e8411bd4d38a5cf7014e5241e757ad

  • SHA512

    1a8a7160adf1acea7cd76a7b739129f95afe931d9e5544d874e20d7f9c330c297618cb1f7cb69ced06fa22aaf95ef68dbf1df1e6898143061c8c360b3b48b61e

  • SSDEEP

    12288:2ZMBqPwNK7sb7/sn1gSp4JZjAH1wBjGrCwDBo6RU2snF90NcZnbhR9jqI:he7w7En1gSp4TjQw5+CCrKFSNYbX9jn

Malware Config

Extracted

Family

formbook

Campaign

d8ax

Decoy

wQDD4HkJc+vErnk=

j7vdn039QTY5Gcs43SDb8R4gwLgFCI7s

ZqPN0enMl4As

kKK00fOMq6KZmHv6kZjEiTm3l1o=

CxCTti/0Dcs5qly/AVHoTg==

5TwVtD3wcevErnk=

/ieoWNXMl4As

caK67QvHGhmiEuKpidX2RA==

Bbyy3J6D1Qw=

LV5N2gOocvpbA/OB/w==

k7k2OMNsBY67libDOi4=

wuDokhS1jLo4mA==

RVGz6anMl4As

la40BCHFwoI/rpugbdoaWQ==

XmVnfY0nNACG5si5u8Ds6F79xw==

dpyQTuytl0/bShsFIYUaHRzIL4quYwxgTA==

yvmesDDPpTSrLhf5GlvvdaCZekhAsg==

obTEXhervaSWkSbDOi4=

ClZogXcOT1DcPyvgOKJM

Drlokv/cjLo4mA==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2520
    • C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe
      "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4804
      • C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe
        "C:\Users\Admin\AppData\Local\Temp\PROFORMA INVOICE 103321.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3256
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:372
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1756

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/372-153-0x0000000001240000-0x000000000126D000-memory.dmp
      Filesize

      180KB

    • memory/372-151-0x00000000030D0000-0x000000000315F000-memory.dmp
      Filesize

      572KB

    • memory/372-150-0x0000000003160000-0x00000000034AA000-memory.dmp
      Filesize

      3.3MB

    • memory/372-148-0x00000000002A0000-0x00000000002BF000-memory.dmp
      Filesize

      124KB

    • memory/372-149-0x0000000001240000-0x000000000126D000-memory.dmp
      Filesize

      180KB

    • memory/372-147-0x0000000000000000-mapping.dmp
    • memory/2520-146-0x0000000003260000-0x000000000335E000-memory.dmp
      Filesize

      1016KB

    • memory/2520-154-0x00000000082D0000-0x00000000083EA000-memory.dmp
      Filesize

      1.1MB

    • memory/2520-152-0x00000000082D0000-0x00000000083EA000-memory.dmp
      Filesize

      1.1MB

    • memory/3256-137-0x0000000000000000-mapping.dmp
    • memory/3256-143-0x0000000000FC0000-0x000000000130A000-memory.dmp
      Filesize

      3.3MB

    • memory/3256-144-0x0000000000422000-0x0000000000424000-memory.dmp
      Filesize

      8KB

    • memory/3256-145-0x0000000000B10000-0x0000000000B20000-memory.dmp
      Filesize

      64KB

    • memory/3256-142-0x0000000000401000-0x000000000042E000-memory.dmp
      Filesize

      180KB

    • memory/3256-141-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3256-140-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/3256-138-0x0000000000400000-0x000000000042E000-memory.dmp
      Filesize

      184KB

    • memory/4804-132-0x0000000000140000-0x000000000022A000-memory.dmp
      Filesize

      936KB

    • memory/4804-136-0x0000000007690000-0x000000000772C000-memory.dmp
      Filesize

      624KB

    • memory/4804-135-0x0000000004BB0000-0x0000000004BBA000-memory.dmp
      Filesize

      40KB

    • memory/4804-134-0x0000000004C40000-0x0000000004CD2000-memory.dmp
      Filesize

      584KB

    • memory/4804-133-0x00000000051F0000-0x0000000005794000-memory.dmp
      Filesize

      5.6MB