Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07-12-2022 07:48

General

  • Target

    fifth.exe

  • Size

    736KB

  • MD5

    f4937a3e14c770221de47df00885285b

  • SHA1

    dc22ac92d802f7339691082330dc36a236e86644

  • SHA256

    1235cd108420d0531298421c807f494e09133bdab337a0d13c6e1bb7ebf239c4

  • SHA512

    f06d1eaf53b7027a768f24d15f8b9cf099145f77765c8ef6a8577f37633ccb147f6d3038a46bce5c21de65b6bd78ab14636d6d233497210af07b2923a0b0c4c7

  • SSDEEP

    12288:JwlQbmomPZefXPtqvyuQwYvCYDAD9AxDZCCjM+9MQJQv8vgUycEn/z:iomxiXQFwv1M9KDZCIMpQDgUDyz

Malware Config

Extracted

Family

formbook

Campaign

06eh

Decoy

LFsv6dX2ii6R8OphWwptZ9Uy+geJcQ==

F2g1Ra3riiwsEeceZ+kPoyzVyQ==

m7+bOE66nh10jg==

Dyb/VMcRh6yNuvVNwJjlrzs=

3yNAvKD3bmuj1Q4=

K7hi/htWsKfW6xc=

sqpSY7/gcvvY0tm0tWucCg==

LnSqfZJAUour0Qo=

Il4dO5W4JE9OlQYNbHc=

LUYTY9QKZHZPe74hTaa/ljM=

Qg6iySJSuuTgNcboVm4=

SJkvGoebIdDEsJn9AI7yPbNK

DKBLqQM7m6oaUKM84/sIFQ==

GOOzpszYDX9lkuZQ5pmdrDDeyg==

V5064wgZl0G1DxNTv5jlrzs=

Onlr5MMHSXuH/91V

oddlSLzpBTyiCAtcvmSS

ITsUV4Gw/mkWaGLjCHs=

HqWBQYO4SQBinnio6GmL

tDrGMY3MC5e1KdgFRw==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\fifth.exe
      "C:\Users\Admin\AppData\Local\Temp\fifth.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1464
      • C:\Users\Admin\AppData\Local\Temp\fifth.exe
        "C:\Users\Admin\AppData\Local\Temp\fifth.exe"
        3⤵
        • Checks computer location settings
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1680
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:808
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1712

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      895KB

      MD5

      1eb6acf76a15b74b38333af47dc1218d

      SHA1

      a3fbc817f59b6a8899dc338cc15a75cdd17dfff1

      SHA256

      a5ef3a78eb333b0e6dca194ea711dcbb036119a788ecfe125f05176fb0fb70a3

      SHA512

      717931aa928de150abbb70d523c7dbd472bfa6c511ab55e0b50df8d9661d33635156ed7b750285fa383cdd4064f225ea022f0bead3e066ee2beba84ef5731c15

    • memory/808-74-0x0000000000190000-0x00000000001AC000-memory.dmp

      Filesize

      112KB

    • memory/808-75-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/808-76-0x00000000020B0000-0x00000000023B3000-memory.dmp

      Filesize

      3.0MB

    • memory/808-77-0x0000000001DE0000-0x0000000001E6F000-memory.dmp

      Filesize

      572KB

    • memory/808-79-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/808-72-0x0000000000000000-mapping.dmp

    • memory/1360-80-0x00000000049E0000-0x0000000004A9B000-memory.dmp

      Filesize

      748KB

    • memory/1360-78-0x00000000049E0000-0x0000000004A9B000-memory.dmp

      Filesize

      748KB

    • memory/1360-71-0x0000000007140000-0x00000000072D8000-memory.dmp

      Filesize

      1.6MB

    • memory/1464-54-0x0000000000270000-0x000000000032E000-memory.dmp

      Filesize

      760KB

    • memory/1464-59-0x0000000001EB0000-0x0000000001EF2000-memory.dmp

      Filesize

      264KB

    • memory/1464-58-0x0000000007F00000-0x0000000007F7A000-memory.dmp

      Filesize

      488KB

    • memory/1464-57-0x0000000000540000-0x000000000054E000-memory.dmp

      Filesize

      56KB

    • memory/1464-56-0x0000000000560000-0x000000000057A000-memory.dmp

      Filesize

      104KB

    • memory/1464-55-0x0000000075B51000-0x0000000075B53000-memory.dmp

      Filesize

      8KB

    • memory/1680-60-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1680-70-0x0000000000110000-0x0000000000120000-memory.dmp

      Filesize

      64KB

    • memory/1680-69-0x0000000000C70000-0x0000000000F73000-memory.dmp

      Filesize

      3.0MB

    • memory/1680-68-0x0000000000401000-0x000000000042E000-memory.dmp

      Filesize

      180KB

    • memory/1680-67-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1680-66-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1680-64-0x00000000004012B0-mapping.dmp

    • memory/1680-63-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB

    • memory/1680-61-0x0000000000400000-0x000000000042E000-memory.dmp

      Filesize

      184KB