Analysis

  • max time kernel
    148s
  • max time network
    171s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    06-12-2022 15:07

General

  • Target

    fc978e8e9d20edf8f2a0c4b157fe1920.exe

  • Size

    225KB

  • MD5

    fc978e8e9d20edf8f2a0c4b157fe1920

  • SHA1

    85dee7df3f6c544117cde35c89d058856fa5f559

  • SHA256

    99c56c4551be01e229f63d5159d90f28c0b3fc18e7beae133aeea99a07f7feeb

  • SHA512

    a6796ffb98031e85d7916f40eca661e2bdc7f76b5f29bed8d818420a1a060acf801c965cc347181c81e5458e72751d4c7e464aa4dd2ba4f7f10ca3d13650ec25

  • SSDEEP

    6144:QBn14Fe6S294SbWAClQO5WkuJ9rkKwT/ZUyeok:g4Fe69IQO5+3krFw

Malware Config

Extracted

Family

formbook

Campaign

henz

Decoy

IxWMb+jVsoinShuZJzk=

TPfKgQZ//oGnKr/J

EsK0WxD5kY65XOW1Td/5CxSUpCUytR7M

KebSmiCP9p8yUw==

HAt/ljkEuqMLHOLCi53Pv8MKX9qk

CY4ogZTwJc4vSw==

WWDIx5UYUDyepntE0YIAPca3/rI=

+Pkr01Lfb2rME7bL

S5nyK0p8jS2xdwQ=

W/oqvlO57LfkLcLHnQ==

zrrwtqkTLwxulm4l8FGopw==

AqucYext8bzFbOKthIm8E6gfVkUHxKY=

OfnjeDs78+RTcz4OHRl+

XKf1wwpZR5hLLjHgmUGOpQ==

JMyhSLoJPTCwn5o9zX2d8i1+

Wk54MBsDhWSVbnIRkQ==

7aaYR/tOhh9piTw5/KHSRwuK2iqgafw7pQ==

hH/EYxN+jC2xdwQ=

S0F4ORqDjS2xdwQ=

0o/UwXnuJ+sJp0cOHRl+

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:2708
    • C:\Users\Admin\AppData\Local\Temp\fc978e8e9d20edf8f2a0c4b157fe1920.exe
      "C:\Users\Admin\AppData\Local\Temp\fc978e8e9d20edf8f2a0c4b157fe1920.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2204
      • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
        "C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe" C:\Users\Admin\AppData\Local\Temp\frlbrtypv.v
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
          "C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1644
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
        PID:1820
      • C:\Windows\SysWOW64\control.exe
        "C:\Windows\SysWOW64\control.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Modifies Internet Explorer settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1924
        • C:\Program Files\Mozilla Firefox\Firefox.exe
          "C:\Program Files\Mozilla Firefox\Firefox.exe"
          3⤵
            PID:1764

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      Query Registry

      1
      T1012

      System Information Discovery

      2
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\ejtmlzkrl.wyb
        Filesize

        185KB

        MD5

        391a7b2eb7db823d74efa88dd6b3be98

        SHA1

        812307dc31a8683db86da0fef9355ea26fceb53e

        SHA256

        44fad663d1e424398b0259a508b2addbdd9379019fe0c75230b5bc3d22de0d65

        SHA512

        c6f02903231330df64a606893d6bb6e1e16345eae775488b79bb29d1b9528e39dd94ec71052bc011fdda414eb1c741b5f11c80dc7f030c388c124cfca02da31b

      • C:\Users\Admin\AppData\Local\Temp\frlbrtypv.v
        Filesize

        5KB

        MD5

        714bfb709c4f13ceca21eff02316687b

        SHA1

        164d8b1385c90bb2314e98cda5a57b2c4d02ebd7

        SHA256

        1741243b58bee7ce1fa356428da1e0adf27da15d7868315b24caabf44351f447

        SHA512

        03c3f25b0b17377b5217f92ee59f1b104647c01e284342ad97d611da89e3f7508c68d8fa8fa4ede5af4fa13dd9f64d3b64f5377cc8e3b397780093aebcc652a0

      • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
        Filesize

        13KB

        MD5

        3413430aa1a177d5befe48543e726854

        SHA1

        adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

        SHA256

        c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

        SHA512

        ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

      • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
        Filesize

        13KB

        MD5

        3413430aa1a177d5befe48543e726854

        SHA1

        adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

        SHA256

        c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

        SHA512

        ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

      • C:\Users\Admin\AppData\Local\Temp\skwwrnzdd.exe
        Filesize

        13KB

        MD5

        3413430aa1a177d5befe48543e726854

        SHA1

        adb75fdf8de8aac0f06a8bd65cf874dbbeab5827

        SHA256

        c6b22738ae5791d67fa73a519d8bb52e269eb591f28320a5b0dde104d32bdb66

        SHA512

        ff5f07df08419ad777208ff13b359ab6bb07068c584ce150d7f5b33d54f0ae18efbd9161342832da62ac258d65377ea129f4b07df094d140746cfb8e24e8e752

      • memory/1244-132-0x0000000000000000-mapping.dmp
      • memory/1644-144-0x00000000015F0000-0x0000000001600000-memory.dmp
        Filesize

        64KB

      • memory/1644-145-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1644-140-0x0000000000401000-0x000000000042F000-memory.dmp
        Filesize

        184KB

      • memory/1644-141-0x0000000001850000-0x0000000001B9A000-memory.dmp
        Filesize

        3.3MB

      • memory/1644-142-0x0000000000FC0000-0x0000000000FD0000-memory.dmp
        Filesize

        64KB

      • memory/1644-139-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1644-137-0x0000000000000000-mapping.dmp
      • memory/1644-146-0x0000000000401000-0x000000000042F000-memory.dmp
        Filesize

        184KB

      • memory/1924-152-0x00000000029D0000-0x0000000002A5F000-memory.dmp
        Filesize

        572KB

      • memory/1924-154-0x0000000000CD0000-0x0000000000CFD000-memory.dmp
        Filesize

        180KB

      • memory/1924-148-0x0000000000000000-mapping.dmp
      • memory/1924-149-0x00000000009A0000-0x00000000009C7000-memory.dmp
        Filesize

        156KB

      • memory/1924-150-0x0000000000CD0000-0x0000000000CFD000-memory.dmp
        Filesize

        180KB

      • memory/1924-151-0x0000000002C40000-0x0000000002F8A000-memory.dmp
        Filesize

        3.3MB

      • memory/2708-143-0x0000000007E80000-0x0000000007FC6000-memory.dmp
        Filesize

        1.3MB

      • memory/2708-153-0x0000000008430000-0x00000000084F7000-memory.dmp
        Filesize

        796KB

      • memory/2708-147-0x0000000007FD0000-0x000000000810D000-memory.dmp
        Filesize

        1.2MB

      • memory/2708-155-0x0000000008430000-0x00000000084F7000-memory.dmp
        Filesize

        796KB