Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    04-12-2022 10:36

General

  • Target

    Sorğu HA-22-28199 22-077.exe

  • Size

    554KB

  • MD5

    ffff0c7d3139145648b89f27dc829e64

  • SHA1

    22142740d3c5f611a8e4487b4f3da05a25b51b23

  • SHA256

    a61da3e0802d4f580e033d44596b0c0cb812c80e0d449d3f427d0e71e2c5f14b

  • SHA512

    20f70410951d074fb19da6e7a8f870f10e11f46386d9ac6215a27f1338530af658e66a9ab86f9832edfcc67e25e4fe5b7bd89ee79edd8803e53bb5cde300d220

  • SSDEEP

    12288:IAVDQ3G17O3qhW8JnD676LkHSS+dJQqhqW8tbVpjLc:2Z8o76LkL+dWiqWKn

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

urde

Decoy

belleriacortland.com

gxzyykx.com

blocksholding.net

zhangjiyuan.com

tyfinck.com

xn--v9s.club

xn--72c9at8ec1l.com

dorismart.online

nocodeuni.com

hmmprocesos.website

quartile.agency

iansdogname.com

karengillen.com

the-bitindexprime.info

nthanisolutions.com

nakamu.online

sahityanepal.com

sinwinindustry.com

shotblastwearingparts.com

nstsuccess.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 58 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2948
    • C:\Users\Admin\AppData\Local\Temp\Sorğu HA-22-28199 22-077.exe
      "C:\Users\Admin\AppData\Local\Temp\Sorğu HA-22-28199 22-077.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:796
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2132
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"
        3⤵
          PID:3116

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/796-134-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/796-135-0x000000000041F140-mapping.dmp
    • memory/796-138-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/796-139-0x00000000012D0000-0x000000000161A000-memory.dmp
      Filesize

      3.3MB

    • memory/796-140-0x0000000000E70000-0x0000000000E84000-memory.dmp
      Filesize

      80KB

    • memory/2132-144-0x0000000000EF0000-0x0000000000F02000-memory.dmp
      Filesize

      72KB

    • memory/2132-149-0x00000000001A0000-0x00000000001CF000-memory.dmp
      Filesize

      188KB

    • memory/2132-147-0x0000000000DB0000-0x0000000000E43000-memory.dmp
      Filesize

      588KB

    • memory/2132-146-0x00000000024D0000-0x000000000281A000-memory.dmp
      Filesize

      3.3MB

    • memory/2132-142-0x0000000000000000-mapping.dmp
    • memory/2132-145-0x00000000001A0000-0x00000000001CF000-memory.dmp
      Filesize

      188KB

    • memory/2948-164-0x0000000007460000-0x0000000007470000-memory.dmp
      Filesize

      64KB

    • memory/2948-159-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-141-0x0000000007CE0000-0x0000000007E48000-memory.dmp
      Filesize

      1.4MB

    • memory/2948-173-0x0000000007480000-0x0000000007490000-memory.dmp
      Filesize

      64KB

    • memory/2948-148-0x00000000029E0000-0x0000000002A95000-memory.dmp
      Filesize

      724KB

    • memory/2948-172-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-150-0x00000000029E0000-0x0000000002A95000-memory.dmp
      Filesize

      724KB

    • memory/2948-151-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-152-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-153-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-154-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-155-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-156-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-157-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-158-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-171-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-160-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-161-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-163-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-170-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-165-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-166-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-167-0x0000000007480000-0x0000000007490000-memory.dmp
      Filesize

      64KB

    • memory/2948-168-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/2948-169-0x0000000002AF0000-0x0000000002B00000-memory.dmp
      Filesize

      64KB

    • memory/3116-143-0x0000000000000000-mapping.dmp
    • memory/4904-132-0x0000027D41D90000-0x0000027D41E1E000-memory.dmp
      Filesize

      568KB

    • memory/4904-133-0x00007FFFDEF20000-0x00007FFFDF9E1000-memory.dmp
      Filesize

      10.8MB

    • memory/4904-136-0x00007FFFDEF20000-0x00007FFFDF9E1000-memory.dmp
      Filesize

      10.8MB