Analysis

  • max time kernel
    239s
  • max time network
    337s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    02-12-2022 09:15

General

  • Target

    tmp.exe

  • Size

    257KB

  • MD5

    db34b27822c1c7d80e7e59ed743ce22c

  • SHA1

    f888efab5bfd957947b95877b4c5c73067dad197

  • SHA256

    3cfd81b824673a6ba23d472bd09d5e7610a3346cce6f23956507af5eab63c012

  • SHA512

    860a92c61d02b1429853c529234ca0885cc37065503a14918ddfd722fd3281f1179fa036315a867eb36475e93db391307255e214b78733d8fd4ce7c93ed7a066

  • SSDEEP

    6144:QBn1+chufZq/1wTiFDMwMBUvosOPuoXK+qvcAYzy/:g+ciAyeUavOha+nAYI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pr28

Decoy

huaxinimg.com

baorungas.com

comercializadoramultimus.com

blr-batipro.com

wantagedfas.uk

1thingplan.one

cweilin.com

lorienconsultingllc.com

jdzsjwx.com

casafacil.site

hkacgt.com

hasid.africa

92dgr97k4hr9.com

cvbiop.xyz

1wbskm.top

fantasticmobility.com

goodchoice2022.com

hafizpower.com

familiajoya.com

fundscrahelp.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 22 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1252
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1156
      • C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe
        "C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe" C:\Users\Admin\AppData\Local\Temp\okwqyzbx.uc
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe
          "C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1768
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            5⤵
              PID:1532
            • C:\Windows\SysWOW64\cmd.exe
              "C:\Windows\SysWOW64\cmd.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:1620
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe"
                6⤵
                  PID:888

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\jbenz.m
        Filesize

        185KB

        MD5

        4b4ce519a534f3436dbbc48d123b6e83

        SHA1

        d10796875fffdebd65a4fec5de8dda497d2fc981

        SHA256

        552b1709acc1df6fed2544cad9f85c7f715c8c7e1e48c94c6ee6607b24a1b114

        SHA512

        b8f38ee58c66bd4b982d26aba7ec7967cd0a96a9b58c7661ffe1835c0b9f2f4c55d1484c2a79ed67eed23cc412607bfb9f77bfc4276727d94fecf917aacd7225

      • C:\Users\Admin\AppData\Local\Temp\okwqyzbx.uc
        Filesize

        5KB

        MD5

        e22f33b90450537ae0e9df382a3c87d2

        SHA1

        876eacd3ee12b0223c6c0564371f0e49ce5e5f29

        SHA256

        b9e9dcefcabf28d10c0a5cc8225b17444567e77a52bfd5b32f8f33a314129fc8

        SHA512

        16f3130d76b6df093022d6842e86136291bd7b28c87f8cd4ec8c903996b3823595f7df69d034f459b9cc26acff8d63c68dc002a7728bbeaf86a7892219a1ad14

      • C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe
        Filesize

        104KB

        MD5

        9d249d3a0088dd3e3b7cdc0068bcb9dc

        SHA1

        1a3e0934278243d4e7c82f69f77271426c18d23d

        SHA256

        292de2987a1b943bbfec1025d9bb571a8c8aa59dd0662565147952f8a2d3dc06

        SHA512

        14c48fffcca018aa32a2f98ef793b28084c1691d78aa7cd2de88f7f568a2b3340920c8eef0372bccd7167a3edd333fa78cdb37ce48b62657a5cb975c8fa7a2a8

      • C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe
        Filesize

        104KB

        MD5

        9d249d3a0088dd3e3b7cdc0068bcb9dc

        SHA1

        1a3e0934278243d4e7c82f69f77271426c18d23d

        SHA256

        292de2987a1b943bbfec1025d9bb571a8c8aa59dd0662565147952f8a2d3dc06

        SHA512

        14c48fffcca018aa32a2f98ef793b28084c1691d78aa7cd2de88f7f568a2b3340920c8eef0372bccd7167a3edd333fa78cdb37ce48b62657a5cb975c8fa7a2a8

      • C:\Users\Admin\AppData\Local\Temp\rzjxgj.exe
        Filesize

        104KB

        MD5

        9d249d3a0088dd3e3b7cdc0068bcb9dc

        SHA1

        1a3e0934278243d4e7c82f69f77271426c18d23d

        SHA256

        292de2987a1b943bbfec1025d9bb571a8c8aa59dd0662565147952f8a2d3dc06

        SHA512

        14c48fffcca018aa32a2f98ef793b28084c1691d78aa7cd2de88f7f568a2b3340920c8eef0372bccd7167a3edd333fa78cdb37ce48b62657a5cb975c8fa7a2a8

      • \Users\Admin\AppData\Local\Temp\rzjxgj.exe
        Filesize

        104KB

        MD5

        9d249d3a0088dd3e3b7cdc0068bcb9dc

        SHA1

        1a3e0934278243d4e7c82f69f77271426c18d23d

        SHA256

        292de2987a1b943bbfec1025d9bb571a8c8aa59dd0662565147952f8a2d3dc06

        SHA512

        14c48fffcca018aa32a2f98ef793b28084c1691d78aa7cd2de88f7f568a2b3340920c8eef0372bccd7167a3edd333fa78cdb37ce48b62657a5cb975c8fa7a2a8

      • \Users\Admin\AppData\Local\Temp\rzjxgj.exe
        Filesize

        104KB

        MD5

        9d249d3a0088dd3e3b7cdc0068bcb9dc

        SHA1

        1a3e0934278243d4e7c82f69f77271426c18d23d

        SHA256

        292de2987a1b943bbfec1025d9bb571a8c8aa59dd0662565147952f8a2d3dc06

        SHA512

        14c48fffcca018aa32a2f98ef793b28084c1691d78aa7cd2de88f7f568a2b3340920c8eef0372bccd7167a3edd333fa78cdb37ce48b62657a5cb975c8fa7a2a8

      • memory/888-73-0x0000000000000000-mapping.dmp
      • memory/1156-54-0x0000000075E01000-0x0000000075E03000-memory.dmp
        Filesize

        8KB

      • memory/1252-70-0x0000000006C10000-0x0000000006D08000-memory.dmp
        Filesize

        992KB

      • memory/1252-80-0x00000000077D0000-0x000000000794E000-memory.dmp
        Filesize

        1.5MB

      • memory/1252-78-0x00000000077D0000-0x000000000794E000-memory.dmp
        Filesize

        1.5MB

      • memory/1252-68-0x0000000007130000-0x00000000072B7000-memory.dmp
        Filesize

        1.5MB

      • memory/1620-75-0x0000000000080000-0x00000000000AF000-memory.dmp
        Filesize

        188KB

      • memory/1620-72-0x0000000000000000-mapping.dmp
      • memory/1620-74-0x000000004AAC0000-0x000000004AB0C000-memory.dmp
        Filesize

        304KB

      • memory/1620-76-0x0000000002090000-0x0000000002393000-memory.dmp
        Filesize

        3.0MB

      • memory/1620-77-0x0000000000470000-0x0000000000503000-memory.dmp
        Filesize

        588KB

      • memory/1620-79-0x0000000000080000-0x00000000000AF000-memory.dmp
        Filesize

        188KB

      • memory/1768-69-0x0000000000310000-0x0000000000324000-memory.dmp
        Filesize

        80KB

      • memory/1768-67-0x00000000002C0000-0x00000000002D4000-memory.dmp
        Filesize

        80KB

      • memory/1768-71-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1768-66-0x0000000000830000-0x0000000000B33000-memory.dmp
        Filesize

        3.0MB

      • memory/1768-65-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1768-63-0x000000000041F120-mapping.dmp
      • memory/2036-56-0x0000000000000000-mapping.dmp