Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2022 02:06

General

  • Target

    November Statement of Account.PDF.exe

  • Size

    339KB

  • MD5

    11af3f8a0cdee232a31e780607313127

  • SHA1

    559b909a727f354a9bd558d55516c255fc42cba3

  • SHA256

    33871b3b4e871618dadc1d16e1746fb3dfbb48af88a0b7ed20d9460c0fac40ea

  • SHA512

    d5498164fb09c3f774056f14674c03ebedb769616fbcf0aa0d663a53672e10e0aade7194effdc76eb2bef315bf687134f3bfbdae5147d900d884634323b077d7

  • SSDEEP

    6144:9kwsWb9o1co70snIJaLfMdUQB4/srymmOTLQiRwE6Qcpwizt7tfxikCtxLJHQBFo:oWbacOIJaAdTaUrymHQiHNSwYFtZfeLD

Malware Config

Extracted

Family

formbook

Campaign

0rft

Decoy

ouhzmTAhN++kgdVvcoAL+ukx7FI=

b/AAsl7j+poCqvsdhQ==

geqhPAMFrNJcHSaYr8Lk

P8N3+6G7Ut/X8wc3

t/OMzJS7R93X8wc3

VwX08ydDu1/ynVc2h/2WBUKHbA==

+ekVLl+umTTBqvsdhQ==

Vcaa12iRzI3+qvsdhQ==

dDIqvVJ9I8ah7fw/Xd4=

p6Xf5u8jI0hYw8hkX9fyQMciqgvG

erJhSR5/Nmn3qvsdhQ==

STdhWvnj9qxWHJ+aQMY=

wMotTfVO6w67i3T9UHemYQ==

ERs8NVCBapjX8wc3

OfIIrnWzp9LjSR+Setj6PqYCng7M

vnh5JHz4WxNQ

iQLl01OIh7/eoT9gABSsdg==

K7Z0BcT7mTuWc3e6U7eHty7YlHt0Qw==

kEJBNFGFf16ie70=

qibJ119LdV6ie70=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1360
    • C:\Users\Admin\AppData\Local\Temp\November Statement of Account.PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\November Statement of Account.PDF.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1764
      • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe
        "C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe" C:\Users\Admin\AppData\Local\Temp\gzvsvwwyuf.v
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2012
        • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe
          "C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1708
    • C:\Windows\SysWOW64\wininit.exe
      "C:\Windows\SysWOW64\wininit.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2000
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1924

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gzvsvwwyuf.v

      Filesize

      5KB

      MD5

      2d6982686a157aabddb568667b4cf793

      SHA1

      3f29ad912774bd0a9ef028ea5921a07b130b0ad2

      SHA256

      df0905166a347a00ee45ef98cff6773b1a3c5fc9b794e6cf49e6b61efd1c089c

      SHA512

      9660a7ec109035dba370aaf944b79336c59c849c1d159b320471902584761455fb81f9d744be3e84d125536f043272cd7d3182f044fc8016db8befd634dcf884

    • C:\Users\Admin\AppData\Local\Temp\itnhcltr.ug

      Filesize

      185KB

      MD5

      63984b3ee5302fe075ece9c0c3a60ae5

      SHA1

      6260ab5b42e975c45af3b55dd8acea33c3c86167

      SHA256

      42a1f853149a8b37feb42c8e18c0506a8f7a43965377509507f9bcfc8b47d59a

      SHA512

      f7e5b18acb035f174618134968a74272ee5e241257c3e017cd35020f64906fdef95277c2a9a360da8245f41febd2427563603af83dfb029dfa1e75c9a865f610

    • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • \Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • \Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll

      Filesize

      932KB

      MD5

      661fd92d4eaeea3740649af5a484d7c8

      SHA1

      c93f868890fee1475f8ec9e7607e26f5dce67d54

      SHA256

      58a478f0560ea22c1bc194263f07cf6f3ecfe47d0c8b534a7bba185f28a1141f

      SHA512

      1fac03c20139fde41d121e0adbd02d127261ce061509996087fc1c80baf2fe0d0f70fed6b83d38a85cfa2e07d038ff809161c7ecce31ec44ac8b89740d3db15d

    • memory/1360-69-0x0000000004900000-0x00000000049D6000-memory.dmp

      Filesize

      856KB

    • memory/1360-78-0x0000000004EB0000-0x0000000004F95000-memory.dmp

      Filesize

      916KB

    • memory/1360-75-0x0000000004EB0000-0x0000000004F95000-memory.dmp

      Filesize

      916KB

    • memory/1708-67-0x0000000000B70000-0x0000000000E73000-memory.dmp

      Filesize

      3.0MB

    • memory/1708-68-0x0000000000120000-0x0000000000130000-memory.dmp

      Filesize

      64KB

    • memory/1708-66-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/1708-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1708-63-0x00000000004012B0-mapping.dmp

    • memory/1764-54-0x0000000075FC1000-0x0000000075FC3000-memory.dmp

      Filesize

      8KB

    • memory/2000-70-0x0000000000000000-mapping.dmp

    • memory/2000-71-0x0000000000180000-0x000000000019A000-memory.dmp

      Filesize

      104KB

    • memory/2000-73-0x0000000002090000-0x0000000002393000-memory.dmp

      Filesize

      3.0MB

    • memory/2000-72-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/2000-74-0x0000000000440000-0x00000000004CF000-memory.dmp

      Filesize

      572KB

    • memory/2000-76-0x0000000000080000-0x00000000000AD000-memory.dmp

      Filesize

      180KB

    • memory/2012-56-0x0000000000000000-mapping.dmp