Analysis

  • max time kernel
    174s
  • max time network
    188s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    08-12-2022 20:29

General

  • Target

    SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe

  • Size

    684KB

  • MD5

    0379ae001c1c573492d6691c94d2a540

  • SHA1

    f92b3c78bb2170074ae40f92743432ef10d55f06

  • SHA256

    7fa778a38b6adbec2ed8ca4e50d2971c4f135c1bf3b7c24a9adb8f86d3ad2ec5

  • SHA512

    d1137357639c3c55460cde25047a4f9706c5ab6501b996cff0ffc30468d4f534da9433218d0a7a4b1c7c2badaf3e44e786443c0b9543b0cc7868f19d28257658

  • SSDEEP

    12288:Zrl405A0lVmc7QFRj+ppGLVXcw1916s5cIGdbT0POkCU4H011Q+T3l+zj:BplVTE/9KC916s5cIMkCUFqC3wzj

Malware Config

Extracted

Family

formbook

Campaign

4u5a

Decoy

Y9HWoINcPu0r7SSSKt4FCmk7

G/E64auYdhRQM4wZW2bcOaY=

bL57APty/StRpW49a+EdxA==

TppryJ0SoslHe8gJFVc=

HXxDShYIEcUJDahdv2nvl5Hlbp4=

EKaq5c6w0nV3WWlEqM4Www==

VM+YjE8XS1OLcH1roYF4zA==

OwK0wxmBGnq2Fg==

B1zy4bulyfY9tj9DK2eIkeYArpTt

Avj5JeA8m9girqfQ4+cZxA==

AOY4dmDFkCdX8HUJMw==

5cQUw3pPMYr07V8=

P7ZsN4/zt63AEw==

FYyVCOpB8Vl//kSkDLPo91Yy

jxwZTBp+5gcsccPxDF+K4bDG2Rpp0A==

iGx9AO58DRhZbXX9

prwVyLkAtlhSU6irmansg8wArpTt

uqa8ZPl+FFObOkdFNg==

tL4OhF22EDaEOkdFNg==

6exH76Z9o7eu/n86vgPE

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Blocklisted process makes network request 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 21 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1228
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.DownloaderNET.345.21626.32453.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1792
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"
        3⤵
          PID:700
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Caspol.exe"
          3⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:472
      • C:\Windows\SysWOW64\autoconv.exe
        "C:\Windows\SysWOW64\autoconv.exe"
        2⤵
          PID:596
        • C:\Windows\SysWOW64\autoconv.exe
          "C:\Windows\SysWOW64\autoconv.exe"
          2⤵
            PID:320
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:1696
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:2044
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:708
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:1756
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:1740
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:1496
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:1444
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:540
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:1820
                            • C:\Windows\SysWOW64\autoconv.exe
                              "C:\Windows\SysWOW64\autoconv.exe"
                              2⤵
                                PID:1012
                              • C:\Windows\SysWOW64\cmstp.exe
                                "C:\Windows\SysWOW64\cmstp.exe"
                                2⤵
                                • Blocklisted process makes network request
                                • Loads dropped DLL
                                • Suspicious use of SetThreadContext
                                • Modifies Internet Explorer settings
                                • Suspicious behavior: EnumeratesProcesses
                                • Suspicious behavior: MapViewOfSection
                                • Suspicious use of AdjustPrivilegeToken
                                • Suspicious use of WriteProcessMemory
                                PID:292
                                • C:\Program Files\Mozilla Firefox\Firefox.exe
                                  "C:\Program Files\Mozilla Firefox\Firefox.exe"
                                  3⤵
                                    PID:1752

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • \Users\Admin\AppData\Local\Temp\sqlite3.dll
                                Filesize

                                927KB

                                MD5

                                7fd80b1cc72dc580c02ca4cfbfb2592d

                                SHA1

                                18da905af878b27151b359cf1a7d0a650764e8a1

                                SHA256

                                1e6dccbdf8527abb53c289da920463b7895300d0d984cc7e91a3ecda4e673190

                                SHA512

                                13f7f29b5ed31c551aa5f27742557aa4d026a226087d6fcbca094819759ecc753a2c33b7422ae88dc6a4a0a966edb8485a18e59a0283ba2686cae5d78e0190a3

                              • memory/292-68-0x0000000000000000-mapping.dmp
                              • memory/292-75-0x00000000000B0000-0x00000000000DD000-memory.dmp
                                Filesize

                                180KB

                              • memory/292-73-0x0000000001D90000-0x0000000001E1F000-memory.dmp
                                Filesize

                                572KB

                              • memory/292-72-0x0000000001FD0000-0x00000000022D3000-memory.dmp
                                Filesize

                                3.0MB

                              • memory/292-71-0x00000000000B0000-0x00000000000DD000-memory.dmp
                                Filesize

                                180KB

                              • memory/292-70-0x0000000000050000-0x0000000000068000-memory.dmp
                                Filesize

                                96KB

                              • memory/292-69-0x0000000076381000-0x0000000076383000-memory.dmp
                                Filesize

                                8KB

                              • memory/472-60-0x00000000004012B0-mapping.dmp
                              • memory/472-56-0x0000000000400000-0x000000000042E000-memory.dmp
                                Filesize

                                184KB

                              • memory/472-66-0x00000000000F0000-0x0000000000100000-memory.dmp
                                Filesize

                                64KB

                              • memory/472-57-0x0000000000400000-0x000000000042E000-memory.dmp
                                Filesize

                                184KB

                              • memory/472-64-0x0000000000401000-0x000000000042E000-memory.dmp
                                Filesize

                                180KB

                              • memory/472-63-0x0000000000400000-0x000000000042E000-memory.dmp
                                Filesize

                                184KB

                              • memory/472-62-0x0000000000400000-0x000000000042E000-memory.dmp
                                Filesize

                                184KB

                              • memory/472-65-0x00000000009E0000-0x0000000000CE3000-memory.dmp
                                Filesize

                                3.0MB

                              • memory/472-59-0x0000000000400000-0x000000000042E000-memory.dmp
                                Filesize

                                184KB

                              • memory/1228-74-0x0000000005070000-0x00000000051DE000-memory.dmp
                                Filesize

                                1.4MB

                              • memory/1228-67-0x0000000004C40000-0x0000000004D64000-memory.dmp
                                Filesize

                                1.1MB

                              • memory/1228-76-0x0000000005070000-0x00000000051DE000-memory.dmp
                                Filesize

                                1.4MB

                              • memory/1792-54-0x0000000000EB0000-0x0000000000F62000-memory.dmp
                                Filesize

                                712KB

                              • memory/1792-55-0x00000000005D0000-0x00000000005DA000-memory.dmp
                                Filesize

                                40KB