Analysis

  • max time kernel
    148s
  • max time network
    164s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    06-12-2022 15:07

General

  • Target

    fc978e8e9d20edf8f2a0c4b157fe1920.exe

  • Size

    225KB

  • MD5

    fc978e8e9d20edf8f2a0c4b157fe1920

  • SHA1

    85dee7df3f6c544117cde35c89d058856fa5f559

  • SHA256

    99c56c4551be01e229f63d5159d90f28c0b3fc18e7beae133aeea99a07f7feeb

  • SHA512

    a6796ffb98031e85d7916f40eca661e2bdc7f76b5f29bed8d818420a1a060acf801c965cc347181c81e5458e72751d4c7e464aa4dd2ba4f7f10ca3d13650ec25

  • SSDEEP

    6144:QBn14Fe6S294SbWAClQO5WkuJ9rkKwT/ZUyeok:g4Fe69IQO5+3krFw

Malware Config

Extracted

Family

formbook

Campaign

henz

Decoy

IxWMb+jVsoinShuZJzk=

TPfKgQZ//oGnKr/J

EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M

KebSmiCP9p8yUw==

HAt/ljkEuqMLHOLCi53Pv8MKX9qk

CY4ogZTwJc4vSw==

WWDIx5UYUDyepntE0YIAPca3/rI=

+Pkr01Lfb2rME7bL

S5nyK0p8jS2xdwQ=

W/oqvlO57LfkLcLHnQ==

zrrwtqkTLwxulm4l8FGopw==

AqucYext8bzFbOKthIm8E6gfVkUHxKY=

OfnjeDs78+RTcz4OHRl+

XKf1wwpZR5hLLjHgmUGOpQ==

JMyhSLoJPTCwn5o9zX2d8i1+

Wk54MBsDhWSVbnIRkQ==

7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==

hH/EYxN+jC2xdwQ=

S0F4ORqDjS2xdwQ=

0o/UwXnuJ+sJp0cOHRl+

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fc978e8e9d20edf8f2a0c4b157fe1920.exe
    "C:\Users\Admin\AppData\Local\Temp\fc978e8e9d20edf8f2a0c4b157fe1920.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:2004
    • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
      "C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe" C:\Users\Admin\AppData\Local\Temp\frlbrtypv.v
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
        "C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe"
        3⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1240
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1336
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:640

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\ejtmlzkrl.wyb
      Filesize

      185KB

      MD5

      391a7b2eb7db823d74efa88dd6b3be98

      SHA1

      812307dc31a8683db86da0fef9355ea26fceb53e

      SHA256

      44fad663d1e424398b0259a508b2addbdd9379019fe0c75230b5bc3d22de0d65

      SHA512

      c6f02903231330df64a606893d6bb6e1e16345eae775488b79bb29d1b9528e39dd94ec71052bc011fdda414eb1c741b5f11c80dc7f030c388c124cfca02da31b

    • C:\Users\Admin\AppData\Local\Temp\frlbrtypv.v
      Filesize

      5KB

      MD5

      714bfb709c4f13ceca21eff02316687b

      SHA1

      164d8b1385c90bb2314e98cda5a57b2c4d02ebd7

      SHA256

      1741243b58bee7ce1fa356428da1e0adf27da15d7868315b24caabf44351f447

      SHA512

      03c3f25b0b17377b5217f92ee59f1b104647c01e284342ad97d611da89e3f7508c68d8fa8fa4ede5af4fa13dd9f64d3b64f5377cc8e3b397780093aebcc652a0

    • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
      Filesize

      13KB

      MD5

      3413430aa1a177d5befe48543e726854

      SHA1

      adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

      SHA256

      c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

      SHA512

      ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

    • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
      Filesize

      13KB

      MD5

      3413430aa1a177d5befe48543e726854

      SHA1

      adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

      SHA256

      c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

      SHA512

      ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

    • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
      Filesize

      13KB

      MD5

      3413430aa1a177d5befe48543e726854

      SHA1

      adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

      SHA256

      c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

      SHA512

      ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

    • \Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
      Filesize

      13KB

      MD5

      3413430aa1a177d5befe48543e726854

      SHA1

      adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

      SHA256

      c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

      SHA512

      ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

    • \Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
      Filesize

      13KB

      MD5

      3413430aa1a177d5befe48543e726854

      SHA1

      adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

      SHA256

      c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

      SHA512

      ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll
      Filesize

      949KB

      MD5

      38a3e021eb32c9976adaf0b3372080fc

      SHA1

      68e02803c646be21007d90bec841c176b82211fd

      SHA256

      8cde0275d60da0d11954f73c7c8862cfc4b306f61bb8b1ce14abe4a193af2652

      SHA512

      b886cc112f2750e7300b66f7242850659fa49fdc97f75aed376cb9f5440875f303a143bf8b51068ec42674f1ebe1dfcc40534f3a7aed3cc4d20f9274b9a66d18

    • memory/1240-63-0x00000000004012B0-mapping.dmp
    • memory/1240-73-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1240-65-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1240-66-0x0000000000401000-0x000000000042F000-memory.dmp
      Filesize

      184KB

    • memory/1240-67-0x00000000009A0000-0x0000000000CA3000-memory.dmp
      Filesize

      3.0MB

    • memory/1240-68-0x0000000000130000-0x0000000000140000-memory.dmp
      Filesize

      64KB

    • memory/1240-74-0x0000000000401000-0x000000000042F000-memory.dmp
      Filesize

      184KB

    • memory/1240-70-0x00000000002B0000-0x00000000002C0000-memory.dmp
      Filesize

      64KB

    • memory/1264-69-0x0000000006B80000-0x0000000006CFE000-memory.dmp
      Filesize

      1.5MB

    • memory/1264-71-0x0000000004A00000-0x0000000004B02000-memory.dmp
      Filesize

      1.0MB

    • memory/1264-80-0x0000000006D00000-0x0000000006E5E000-memory.dmp
      Filesize

      1.4MB

    • memory/1264-82-0x0000000006D00000-0x0000000006E5E000-memory.dmp
      Filesize

      1.4MB

    • memory/1336-72-0x0000000000000000-mapping.dmp
    • memory/1336-76-0x0000000000BB0000-0x0000000000BC8000-memory.dmp
      Filesize

      96KB

    • memory/1336-77-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1336-78-0x0000000001FD0000-0x00000000022D3000-memory.dmp
      Filesize

      3.0MB

    • memory/1336-79-0x0000000000950000-0x00000000009DF000-memory.dmp
      Filesize

      572KB

    • memory/1336-81-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/1980-56-0x0000000000000000-mapping.dmp
    • memory/2004-54-0x00000000764D1000-0x00000000764D3000-memory.dmp
      Filesize

      8KB