Analysis

  • max time kernel
    269s
  • max time network
    274s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05-12-2022 10:28

General

  • Target

    srbgxywv96tp5kc.exe

  • Size

    661KB

  • MD5

    bc24bbabc84243feeaf0eb15d93ff488

  • SHA1

    d3a2c9d7d4c3178875b52f095f4283404fdc348d

  • SHA256

    e752c4ee3b2c0db6221f94f88acc85bb622b3c9dfd94614dd432d4785ad84cf3

  • SHA512

    0f3f2603af9368587fb6f30bb763e0cb2291ac4e651cd1a5d44fb17407d056a1fe90a7fce17e1032862d355a3768620ccb3951e83659b92c0fb8202d65a29d0e

  • SSDEEP

    12288:kPuYd+V6b1momPZefvB3bEZgN33pnxbB8Csck4U2E+z3SoVOdEIib9uaFskvQPuI:kPuYd+V6bIomxivNwZKnRsR8/CoMEBb4

Malware Config

Extracted

Family

formbook

Campaign

fqwu

Decoy

N6XHavFRXQTRmNUkF9dn

EoaWTgFMmLFmUJ7CJNkTiGoj5A==

Dm+WNJDwSQa5cML3Q7EBiGoj5A==

nixR8ZCkOWjqrASBuic=

yvWQNApkdf4QYIih4+xUDY0=

RtmBQtDYDb50g8btXA==

8SU541y9Ec12NYK8PSOfA8OPpaphimY=

/yEvxvlAkquuY3W1QQ==

AlHZgYW4BiI9V+M=

YsHIUsAOO15j+9TnWA==

JJu1S7QIIMij0xUqlUtv

CmWBLrD98YnyUCCFvy0=

uPwhAVEvtu1rTuY=

PI6bR88GVGXmRlpxpKjtBpo=

GnL7qs9HVQAiF6ckF9dn

2zVeBFKZgO1rTuY=

2VI1VpOg7boCAFxvrWN3ys9rovE=

L1lO62zA2o1QEEZRQtgh7g==

brhF5dY1e3zmSyCFvy0=

U6m2TsEidTTdsA5kX8wh7g==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2712
    • C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe
      "C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4700
      • C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe
        "C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe"
        3⤵
          PID:4140
        • C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe
          "C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe"
          3⤵
            PID:5012
          • C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe
            "C:\Users\Admin\AppData\Local\Temp\srbgxywv96tp5kc.exe"
            3⤵
            • Checks computer location settings
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:5024
        • C:\Windows\SysWOW64\explorer.exe
          "C:\Windows\SysWOW64\explorer.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:3936
          • C:\Program Files\Mozilla Firefox\Firefox.exe
            "C:\Program Files\Mozilla Firefox\Firefox.exe"
            3⤵
              PID:1672
        • C:\Windows\system32\WerFault.exe
          C:\Windows\system32\WerFault.exe -pss -s 460 -p 4172 -ip 4172
          1⤵
            PID:1708
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 4172 -s 1116
            1⤵
            • Program crash
            PID:4884

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2712-150-0x0000000007F70000-0x0000000008101000-memory.dmp

            Filesize

            1.6MB

          • memory/2712-147-0x0000000002C60000-0x0000000002DEA000-memory.dmp

            Filesize

            1.5MB

          • memory/2712-160-0x0000000008110000-0x0000000008254000-memory.dmp

            Filesize

            1.3MB

          • memory/2712-159-0x0000000008110000-0x0000000008254000-memory.dmp

            Filesize

            1.3MB

          • memory/3936-156-0x0000000002D10000-0x000000000305A000-memory.dmp

            Filesize

            3.3MB

          • memory/3936-154-0x0000000000560000-0x0000000000993000-memory.dmp

            Filesize

            4.2MB

          • memory/3936-155-0x0000000000CA0000-0x0000000000CCD000-memory.dmp

            Filesize

            180KB

          • memory/3936-151-0x0000000000000000-mapping.dmp

          • memory/3936-158-0x0000000000CA0000-0x0000000000CCD000-memory.dmp

            Filesize

            180KB

          • memory/3936-157-0x0000000002AF0000-0x0000000002B7F000-memory.dmp

            Filesize

            572KB

          • memory/4140-137-0x0000000000000000-mapping.dmp

          • memory/4700-136-0x00000000063B0000-0x000000000644C000-memory.dmp

            Filesize

            624KB

          • memory/4700-132-0x0000000000CB0000-0x0000000000D5C000-memory.dmp

            Filesize

            688KB

          • memory/4700-135-0x00000000056F0000-0x00000000056FA000-memory.dmp

            Filesize

            40KB

          • memory/4700-134-0x0000000005740000-0x00000000057D2000-memory.dmp

            Filesize

            584KB

          • memory/4700-133-0x0000000005CF0000-0x0000000006294000-memory.dmp

            Filesize

            5.6MB

          • memory/5012-138-0x0000000000000000-mapping.dmp

          • memory/5024-146-0x0000000001340000-0x0000000001350000-memory.dmp

            Filesize

            64KB

          • memory/5024-152-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/5024-153-0x0000000000401000-0x000000000042F000-memory.dmp

            Filesize

            184KB

          • memory/5024-149-0x00000000031C0000-0x00000000031D0000-memory.dmp

            Filesize

            64KB

          • memory/5024-148-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/5024-144-0x0000000001360000-0x00000000016AA000-memory.dmp

            Filesize

            3.3MB

          • memory/5024-143-0x0000000000401000-0x000000000042F000-memory.dmp

            Filesize

            184KB

          • memory/5024-142-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/5024-140-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/5024-139-0x0000000000000000-mapping.dmp