Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 02:29

General

  • Target

    SecuriteInfo.com.Trojan.DownloaderNET.345.13381.27886.exe

  • Size

    673KB

  • MD5

    e7ac037813e0f4fa8d32974a542a2d08

  • SHA1

    093356469b8932c6168e43d427127d7ed5b56af4

  • SHA256

    1734985df87235e747cf465d2d8d192f609275a7193a723764c8654b47357083

  • SHA512

    e0fe51b1c332d763318cfcb486280d6c7af34486d01dbec9b8b994bf7a69270194ad243299f01788f5781ae5fbe99575dc89bd126d90abac27c186efee14ee33

  • SSDEEP

    12288:xZNfbYhbXbqhf/groDmU2md5mq6yCCDEa4RUOyV0eeoWtO6TGhAh:HNfqbXbqhf/ioDmXgmq6yYaAgOeeoWt/

Malware Config

Extracted

Family

formbook

Campaign

ctap

Decoy

7fuiHU5O7pBugItrXtDlRbQzVNAypQ==

Ioe4Ezkvrkk5SljtGsXC

7SdYmzWqxYzoB10eYg==

87z12VKpqmy0nXHtGsXC

frPRoZR38nhTXl/tGsXC

JybcU3xwAWn21yEPd4XnKA==

B6LTKeV3SeQZAg==

9iFOJSEVtE+I6ea4tn6M72ANGm3K

bROuHdVCVl63QIZuI2etey+ugP0=

25FDh/Be3fhaReK+BwZm9aY+og==

ipYbazKawI7oB10eYg==

Y3ONgI2GHcStmm5WhEZCsE/GlNJovg==

NMjp1U2zzpPoB10eYg==

ZZOygHxoGkBxNTz1RnI=

Hy1dkswBcyQh

94qXZbB1+8ciD4Q=

JUhyQ8Fxl+4gBA==

7wuj4eTJFutgR7+k1R8mIA==

Nj3QJ1RBulY2AMS/1R8mIA==

LjFXk8zI5vgdq8N6ropiNA==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Blocklisted process makes network request 2 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.13381.27886.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.13381.27886.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1136
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3516
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Blocklisted process makes network request
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:5096
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1584

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1040-142-0x0000000008680000-0x0000000008803000-memory.dmp

      Filesize

      1.5MB

    • memory/1040-155-0x0000000007C40000-0x0000000007D98000-memory.dmp

      Filesize

      1.3MB

    • memory/1040-153-0x0000000007C40000-0x0000000007D98000-memory.dmp

      Filesize

      1.3MB

    • memory/1040-145-0x00000000033C0000-0x0000000003498000-memory.dmp

      Filesize

      864KB

    • memory/1136-132-0x0000018019350000-0x00000180193FE000-memory.dmp

      Filesize

      696KB

    • memory/1136-138-0x00007FF8F3D30000-0x00007FF8F47F1000-memory.dmp

      Filesize

      10.8MB

    • memory/3516-144-0x00000000015E0000-0x00000000015F0000-memory.dmp

      Filesize

      64KB

    • memory/3516-147-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/3516-139-0x0000000001A70000-0x0000000001DBA000-memory.dmp

      Filesize

      3.3MB

    • memory/3516-143-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3516-137-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/3516-136-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3516-146-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3516-141-0x0000000001430000-0x0000000001440000-memory.dmp

      Filesize

      64KB

    • memory/3516-133-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3516-134-0x00000000004012B0-mapping.dmp

    • memory/5096-150-0x0000000000C80000-0x0000000000CAD000-memory.dmp

      Filesize

      180KB

    • memory/5096-151-0x0000000002E50000-0x000000000319A000-memory.dmp

      Filesize

      3.3MB

    • memory/5096-152-0x0000000002BE0000-0x0000000002C6F000-memory.dmp

      Filesize

      572KB

    • memory/5096-149-0x0000000000CE0000-0x0000000000CF6000-memory.dmp

      Filesize

      88KB

    • memory/5096-154-0x0000000000C80000-0x0000000000CAD000-memory.dmp

      Filesize

      180KB

    • memory/5096-148-0x0000000000000000-mapping.dmp