Analysis

  • max time kernel
    154s
  • max time network
    210s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 13:32

General

  • Target

    Invoice.exe

  • Size

    602KB

  • MD5

    75bab4e3e275410ee46f56c96d2ca719

  • SHA1

    ff9f741609c0009d066c33d8fd8d668c66f6c829

  • SHA256

    1cb82faf9f59ad0c5a831297d038b885c4bf15c933a9730abbcbfab86e6eb1cc

  • SHA512

    deb1b0dce46a9bd2b2ee90f61fbe9f41db562b35782c1b83c6ac41ff0c384ea27b828e5ef03e644b9fbd40a1dd0e24a1fa57c4eb625a24752c18b9ac2563ce57

  • SSDEEP

    12288:gOVGmi1JQ52I8sDQJRZ+z+8xmduDYHkUVszxOAzZ21vMiNSpS:gcJAJtESRY+8xiHxefoNSo

Malware Config

Extracted

Family

formbook

Campaign

scse

Decoy

SKpYFyVNT2zunKf0uuM=

FlEHUseI7I5XbrO8fR/XBcS9ZA==

FPuxoUOxkLiATugw

VKdxsDSk0jdT5Kw=

FpqHf9iI/1tl97E=

YGI6sIl3UIxfZvlD+JiUuuLR

oBAEO0suBEAD5aK00A==

RKJqTzg4gQ/Q6DYSuTjDGkwuyl0ik5Kb8w==

VFg9s3W0/Ype8A3cZb+D7g==

hwD+VNd6014nrsaTWm4FBcS9ZA==

zkAdUq1soKYUfZaTqLmL

XVQ9WbRivUIQ477a/hKv+g==

QireF2geizAwmp674AGc5g==

PSTUQxs6j8OATugw

LHJhyy2VbX8NEqf0uuM=

MiY1vg6T3HqATugw

wqkUjaVXnGgBqA==

jUr/eUtSIT01Wegt

PjQidcqKzAbSZICUZb+D7g==

OkAmcv12sUEAIHwFHakzdIo2FPHw

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2700
    • C:\Users\Admin\AppData\Local\Temp\Invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\Invoice.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1728
      • C:\Users\Admin\AppData\Local\Temp\duvgcae.exe
        "C:\Users\Admin\AppData\Local\Temp\duvgcae.exe" "C:\Users\Admin\AppData\Local\Temp\jptavihvrk.au3"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SendNotifyMessage
        • Suspicious use of WriteProcessMemory
        PID:4592
        • C:\Users\Admin\AppData\Local\Temp\duvgcae.exe
          "C:\Users\Admin\AppData\Local\Temp\duvgcae.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3632
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1928

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\duvgcae.exe
    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\duvgcae.exe
    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\duvgcae.exe
    Filesize

    872KB

    MD5

    c56b5f0201a3b3de53e561fe76912bfd

    SHA1

    2a4062e10a5de813f5688221dbeb3f3ff33eb417

    SHA256

    237d1bca6e056df5bb16a1216a434634109478f882d3b1d58344c801d184f95d

    SHA512

    195b98245bb820085ae9203cdb6d470b749d1f228908093e8606453b027b7d7681ccd7952e30c2f5dd40f8f0b999ccfc60ebb03419b574c08de6816e75710d2c

  • C:\Users\Admin\AppData\Local\Temp\jptavihvrk.au3
    Filesize

    5KB

    MD5

    7e6ba6f36513a2cda69a15eda45b2de9

    SHA1

    5f528c1bed029bfb1ecc6b0bfaa83fd25ef9bc09

    SHA256

    b9e3ad91039c82865ffe7e7be634f2168b3a7053b31e8e36e4345430d3c0fa4a

    SHA512

    44fc44089a9c8d0b9bca7ab29e8e6a868d5041bd7002a255bdfdeb344580d6c696a52aa3176c74a8a25a6179cbbc9bd488fd87a743df1cc5efbe98f18aea7b6f

  • C:\Users\Admin\AppData\Local\Temp\lseflylbcc.t
    Filesize

    184KB

    MD5

    44241ea99f4c61f04185fa146d8738c4

    SHA1

    3df2d7145ee69521dc5a0102381777309574d0b0

    SHA256

    dc0a3b837655f9c3d21c5933e0f92f1f341d2e7a569f123857db046daaac9a84

    SHA512

    c8dd7e2026b500c4af88876c981a630b26e3b72ff42026539bebf5d9547ebbdd61d427232a9cb123ac2fb5859705e495addb77f9860549dc49661243f5c8b715

  • C:\Users\Admin\AppData\Local\Temp\ygxmywv.k
    Filesize

    86KB

    MD5

    632e8107bcf473c922f1dc510a60d620

    SHA1

    7f2cf9095a6a09d14a01cc7cf38b704252942eb9

    SHA256

    edaee34a2d9d5ae9b2bb18be65616404f4b879ee2022f648bc90ce8260949629

    SHA512

    402e55f52a39f44f5116de38e5c5e267b452ac7f4bb5394a7d9f5ead8081938185a9d16cc0cd071f6c8985df1565d38adc6a1d7490e471a204c4ed5dc121bde7

  • memory/1928-145-0x0000000000000000-mapping.dmp
  • memory/1928-152-0x00000000012B0000-0x00000000012DD000-memory.dmp
    Filesize

    180KB

  • memory/1928-150-0x0000000003110000-0x000000000319F000-memory.dmp
    Filesize

    572KB

  • memory/1928-148-0x0000000003310000-0x000000000365A000-memory.dmp
    Filesize

    3.3MB

  • memory/1928-146-0x00000000005C0000-0x00000000005DF000-memory.dmp
    Filesize

    124KB

  • memory/1928-147-0x00000000012B0000-0x00000000012DD000-memory.dmp
    Filesize

    180KB

  • memory/2700-156-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/2700-153-0x0000000009150000-0x0000000009209000-memory.dmp
    Filesize

    740KB

  • memory/2700-163-0x0000000001520000-0x0000000001530000-memory.dmp
    Filesize

    64KB

  • memory/2700-162-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/2700-161-0x0000000001480000-0x0000000001490000-memory.dmp
    Filesize

    64KB

  • memory/2700-149-0x0000000008EC0000-0x0000000008FAC000-memory.dmp
    Filesize

    944KB

  • memory/2700-160-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/2700-151-0x0000000009150000-0x0000000009209000-memory.dmp
    Filesize

    740KB

  • memory/2700-159-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/2700-144-0x0000000008EC0000-0x0000000008FAC000-memory.dmp
    Filesize

    944KB

  • memory/2700-154-0x0000000001480000-0x0000000001490000-memory.dmp
    Filesize

    64KB

  • memory/2700-155-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/2700-158-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/2700-157-0x0000000001510000-0x0000000001520000-memory.dmp
    Filesize

    64KB

  • memory/3632-138-0x0000000000000000-mapping.dmp
  • memory/3632-140-0x0000000000840000-0x000000000086E000-memory.dmp
    Filesize

    184KB

  • memory/3632-141-0x0000000001160000-0x00000000014AA000-memory.dmp
    Filesize

    3.3MB

  • memory/3632-143-0x0000000000D00000-0x0000000000D10000-memory.dmp
    Filesize

    64KB

  • memory/3632-142-0x0000000000862000-0x0000000000864000-memory.dmp
    Filesize

    8KB

  • memory/4592-132-0x0000000000000000-mapping.dmp