Analysis

  • max time kernel
    149s
  • max time network
    154s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-12-2022 02:06

General

  • Target

    November Statement of Account.PDF.exe

  • Size

    339KB

  • MD5

    11af3f8a0cdee232a31e780607313127

  • SHA1

    559b909a727f354a9bd558d55516c255fc42cba3

  • SHA256

    33871b3b4e871618dadc1d16e1746fb3dfbb48af88a0b7ed20d9460c0fac40ea

  • SHA512

    d5498164fb09c3f774056f14674c03ebedb769616fbcf0aa0d663a53672e10e0aade7194effdc76eb2bef315bf687134f3bfbdae5147d900d884634323b077d7

  • SSDEEP

    6144:9kwsWb9o1co70snIJaLfMdUQB4/srymmOTLQiRwE6Qcpwizt7tfxikCtxLJHQBFo:oWbacOIJaAdTaUrymHQiHNSwYFtZfeLD

Malware Config

Extracted

Family

formbook

Campaign

0rft

Decoy

ouhzmTAhN++kgdVvcoAL+ukx7FI=

b/AAsl7j+poCqvsdhQ==

geqhPAMFrNJcHSaYr8Lk

P8N3+6G7Ut/X8wc3

t/OMzJS7R93X8wc3

VwX08ydDu1/ynVc2h/2WBUKHbA==

+ekVLl+umTTBqvsdhQ==

Vcaa12iRzI3+qvsdhQ==

dDIqvVJ9I8ah7fw/Xd4=

p6Xf5u8jI0hYw8hkX9fyQMciqgvG

erJhSR5/Nmn3qvsdhQ==

STdhWvnj9qxWHJ+aQMY=

wMotTfVO6w67i3T9UHemYQ==

ERs8NVCBapjX8wc3

OfIIrnWzp9LjSR+Setj6PqYCng7M

vnh5JHz4WxNQ

iQLl01OIh7/eoT9gABSsdg==

K7Z0BcT7mTuWc3e6U7eHty7YlHt0Qw==

kEJBNFGFf16ie70=

qibJ119LdV6ie70=

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 9 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2548
    • C:\Users\Admin\AppData\Local\Temp\November Statement of Account.PDF.exe
      "C:\Users\Admin\AppData\Local\Temp\November Statement of Account.PDF.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4996
      • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe
        "C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe" C:\Users\Admin\AppData\Local\Temp\gzvsvwwyuf.v
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4804
        • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe
          "C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:976
    • C:\Windows\SysWOW64\msiexec.exe
      "C:\Windows\SysWOW64\msiexec.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1784
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1512

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gzvsvwwyuf.v

      Filesize

      5KB

      MD5

      2d6982686a157aabddb568667b4cf793

      SHA1

      3f29ad912774bd0a9ef028ea5921a07b130b0ad2

      SHA256

      df0905166a347a00ee45ef98cff6773b1a3c5fc9b794e6cf49e6b61efd1c089c

      SHA512

      9660a7ec109035dba370aaf944b79336c59c849c1d159b320471902584761455fb81f9d744be3e84d125536f043272cd7d3182f044fc8016db8befd634dcf884

    • C:\Users\Admin\AppData\Local\Temp\itnhcltr.ug

      Filesize

      185KB

      MD5

      63984b3ee5302fe075ece9c0c3a60ae5

      SHA1

      6260ab5b42e975c45af3b55dd8acea33c3c86167

      SHA256

      42a1f853149a8b37feb42c8e18c0506a8f7a43965377509507f9bcfc8b47d59a

      SHA512

      f7e5b18acb035f174618134968a74272ee5e241257c3e017cd35020f64906fdef95277c2a9a360da8245f41febd2427563603af83dfb029dfa1e75c9a865f610

    • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • C:\Users\Admin\AppData\Local\Temp\iyikesvwc.exe

      Filesize

      289KB

      MD5

      490db3fe40ec4b47f561d5d9d337af61

      SHA1

      2f2883d6461e5543d844e3acbca220a9a8e8dff7

      SHA256

      a7f55c7e2dbd896c6db788f97f734b1061f670c927096899a77bc623facfabd1

      SHA512

      6a14eb4ba4779f85802f6d671a592d386911a41e1b48baf1039e21f8050bc5f0be033beb833d70a9fa15bf2c405e50464a041741ce624b8a9e903efca448b1cf

    • memory/976-144-0x00000000014D0000-0x00000000014E0000-memory.dmp

      Filesize

      64KB

    • memory/976-137-0x0000000000000000-mapping.dmp

    • memory/976-139-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/976-140-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/976-141-0x0000000001830000-0x0000000001B7A000-memory.dmp

      Filesize

      3.3MB

    • memory/976-142-0x0000000001360000-0x0000000001370000-memory.dmp

      Filesize

      64KB

    • memory/976-148-0x0000000000401000-0x000000000042F000-memory.dmp

      Filesize

      184KB

    • memory/976-147-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1784-146-0x0000000000000000-mapping.dmp

    • memory/1784-150-0x00000000012D0000-0x00000000012FD000-memory.dmp

      Filesize

      180KB

    • memory/1784-149-0x0000000000FA0000-0x0000000000FB2000-memory.dmp

      Filesize

      72KB

    • memory/1784-151-0x0000000003170000-0x00000000034BA000-memory.dmp

      Filesize

      3.3MB

    • memory/1784-152-0x0000000003010000-0x000000000309F000-memory.dmp

      Filesize

      572KB

    • memory/1784-154-0x00000000012D0000-0x00000000012FD000-memory.dmp

      Filesize

      180KB

    • memory/2548-145-0x0000000008C10000-0x0000000008D9A000-memory.dmp

      Filesize

      1.5MB

    • memory/2548-143-0x00000000087C0000-0x0000000008944000-memory.dmp

      Filesize

      1.5MB

    • memory/2548-153-0x0000000008690000-0x0000000008734000-memory.dmp

      Filesize

      656KB

    • memory/2548-155-0x0000000008690000-0x0000000008734000-memory.dmp

      Filesize

      656KB

    • memory/4804-132-0x0000000000000000-mapping.dmp