Analysis

  • max time kernel
    166s
  • max time network
    196s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 12:18

General

  • Target

    PO-22010830.exe

  • Size

    747KB

  • MD5

    876cdf36f3096235e8a7d2d226939dfd

  • SHA1

    bf2ac1b26edb83492c37e6fe43d779a1f3ca2555

  • SHA256

    933b7f5c98ba6f0c28c54a11d35c8ac0a36d825699df11a896767556ebce1603

  • SHA512

    c9cc4e3ef82cdac35bc7d9ff2e9339692453d437949c33d88700c12d979038886b872992e1fd0641ecc99ebe388586b764a440f29973e0c85ac27cdddb494526

  • SSDEEP

    12288:WyVeA2iN9b3vT2hbrG/fpI0n5ryqQBgVA5AAasVejNwSyGi8AoMM:DMA1HLT2hbK/ymWZSVAyAV8jov8nMM

Malware Config

Extracted

Family

formbook

Campaign

m5oe

Decoy

HdR8hG6r12hBYuHY4zv6YeeFPQ==

tD1V9gswYvgQXEGd

1xKtJ1LdqRYMRMC84U1A

MbhjiWb7Lz8z7KIWl3UyUIJwA6Tb

joVB5Xggy2RtE+odsZg=

TrduAIay6Y3SvoIK20xI

pSna7LOsXXwXT/zz3Iow4g==

QnthmO4Qst5gC3sDoA==

eAirzOOgO7SOCenz3Iow4g==

xg0uSbfLTg==

YWQXwyGRzPEHzGrDFE8CBSE=

ujLnfuXoH9dbgHIK20xI

291v0XsGFrYQXEGd

MRvTd/qMuaHpjCM=

X131fLC6VWX4MsvCb2IPjIfq8wlksWfg

Y9Bur8DbgqFt/Yni86MMCCE=

q6RTBmJkmy5pWTmmCCrvmuCDPw==

mQS26DojT+EQXEGd

sjHQ+Kav2Wx9FeodsZg=

JA24UKnTA5re1LhcQaVo/w==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1108
    • C:\Users\Admin\AppData\Local\Temp\PO-22010830.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-22010830.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Users\Admin\AppData\Local\Temp\PO-22010830.exe
        "C:\Users\Admin\AppData\Local\Temp\PO-22010830.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1468
    • C:\Windows\SysWOW64\autochk.exe
      "C:\Windows\SysWOW64\autochk.exe"
      2⤵
        PID:2960
      • C:\Windows\SysWOW64\WWAHost.exe
        "C:\Windows\SysWOW64\WWAHost.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:704
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:4828

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/704-146-0x0000000000000000-mapping.dmp
      • memory/704-151-0x0000000001AB0000-0x0000000001DFA000-memory.dmp
        Filesize

        3.3MB

      • memory/704-150-0x0000000000CC0000-0x0000000000CED000-memory.dmp
        Filesize

        180KB

      • memory/704-149-0x0000000000720000-0x00000000007FC000-memory.dmp
        Filesize

        880KB

      • memory/704-152-0x00000000018B0000-0x000000000193F000-memory.dmp
        Filesize

        572KB

      • memory/704-154-0x0000000000CC0000-0x0000000000CED000-memory.dmp
        Filesize

        180KB

      • memory/1108-161-0x0000000001140000-0x0000000001150000-memory.dmp
        Filesize

        64KB

      • memory/1108-158-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1108-157-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1108-156-0x0000000001140000-0x0000000001150000-memory.dmp
        Filesize

        64KB

      • memory/1108-155-0x0000000000E70000-0x0000000000E80000-memory.dmp
        Filesize

        64KB

      • memory/1108-145-0x0000000008810000-0x0000000008914000-memory.dmp
        Filesize

        1.0MB

      • memory/1108-159-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1108-160-0x00000000084B0000-0x00000000085A5000-memory.dmp
        Filesize

        980KB

      • memory/1108-153-0x00000000084B0000-0x00000000085A5000-memory.dmp
        Filesize

        980KB

      • memory/1108-162-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1108-163-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1108-164-0x0000000002FA0000-0x0000000002FB0000-memory.dmp
        Filesize

        64KB

      • memory/1468-140-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1468-148-0x0000000000401000-0x000000000042F000-memory.dmp
        Filesize

        184KB

      • memory/1468-147-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1468-144-0x00000000015D0000-0x00000000015E0000-memory.dmp
        Filesize

        64KB

      • memory/1468-142-0x0000000001BB0000-0x0000000001EFA000-memory.dmp
        Filesize

        3.3MB

      • memory/1468-141-0x0000000000401000-0x000000000042F000-memory.dmp
        Filesize

        184KB

      • memory/1468-138-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1468-137-0x0000000000000000-mapping.dmp
      • memory/4512-132-0x0000000000C20000-0x0000000000CE2000-memory.dmp
        Filesize

        776KB

      • memory/4512-136-0x0000000008EA0000-0x0000000008F3C000-memory.dmp
        Filesize

        624KB

      • memory/4512-135-0x0000000005660000-0x000000000566A000-memory.dmp
        Filesize

        40KB

      • memory/4512-134-0x00000000056A0000-0x0000000005732000-memory.dmp
        Filesize

        584KB

      • memory/4512-133-0x0000000005D20000-0x00000000062C4000-memory.dmp
        Filesize

        5.6MB