Analysis

  • max time kernel
    216s
  • max time network
    274s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    09-12-2022 13:39

General

  • Target

    103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe

  • Size

    333KB

  • MD5

    4c7135b466d0d97fe0dce29650ed97f2

  • SHA1

    fde47b76280185cd1d39e9d22aed3d8e0047814f

  • SHA256

    81276296b6d3afcded72b489d0d5b9c7e6e7a13569e3868f6c063489318d2a9c

  • SHA512

    bb0820a6ee336942a3a06da0cc2bdc49ea870cde63ff0972ce1559531e473c256590826bd6b4ac5afe913748a4b07d2a7a4be0b4b1d047a7ba5d416329aaa91b

  • SSDEEP

    6144:9kw5wnBY2pNRJapeMSZE2dcEtJI5WwYFJ0oPsMf48ZKXQm1s:YBfpf+eMSZ37keP0m1KX8

Malware Config

Extracted

Family

formbook

Campaign

f4ca

Decoy

omFHB5ajfJi1UEIEV9XcoRw=

UBjJkmQPyprdhcFF/bdCWQ==

evGKkBUj1je+otcfpw==

KgvGVeOATSt3nug0BIOm2JvOQycB

Lv6o3K0r9aSjI0lr9fg1txw=

LH1jJb/HieQpsEdqWCQTvX2PmsDVIeg=

99dte0XauJfk6Xv+uQxJFgA1gMktBA==

21FkkGB9gMniDQw2ffu6

r4lKBM/q6TZwVZfS

F+14qHeVWi56KdQ=

BgWXRsVoICMvvQ==

I+EozFl0Uy56KdQ=

xoXCgEllKEbWfjFCCLo=

qo9G1lXvvGt5GkxrLQWw

ORNlYic0PJ2ip4geEFSv

Yj+GFpvFxy0uVYx1fLI/XQ==

XL+veIKPjOTe4fjvFs+n

D2JKVAfuakXCAyoEvw==

voWJU81tH56wvt/vImbCcgVd

dVEcwFrmb8bZ4vXvFs+n

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1232
    • C:\Users\Admin\AppData\Local\Temp\103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe
      "C:\Users\Admin\AppData\Local\Temp\103.133.110.147_-_OneDrive_-_csrss.exe___4c7135b466d0d97fe0dce29650ed97f2.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Users\Admin\AppData\Local\Temp\kqegg.exe
        "C:\Users\Admin\AppData\Local\Temp\kqegg.exe" C:\Users\Admin\AppData\Local\Temp\wvdthhroe.qae
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:560
        • C:\Users\Admin\AppData\Local\Temp\kqegg.exe
          "C:\Users\Admin\AppData\Local\Temp\kqegg.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1104
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:940

Network

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

System Information Discovery

3
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\dvnlw.sq
    Filesize

    185KB

    MD5

    96d4bdf2e55c695f32c41a6f33a7a98c

    SHA1

    23a374f703723ef2ebfe7f6d8338a705d7c8a6b4

    SHA256

    9c000d4b6530199eca0fe0a900c5db8807e4e13b740619e25b622694a629b5a1

    SHA512

    59475292a1ad844126099e713f31d61ae756f7c0e50e95be3cf1dbf9841995a254b6d1cb00fa1ba783cf2043713c46e6c40fe0ecad45c504ac0c82ed42970170

  • C:\Users\Admin\AppData\Local\Temp\kqegg.exe
    Filesize

    276KB

    MD5

    b7b47839865c6fc7a47965cb0a15ede7

    SHA1

    04cbdc9da3b625484f3276762abf9516f1797197

    SHA256

    ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c

    SHA512

    d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c

  • C:\Users\Admin\AppData\Local\Temp\kqegg.exe
    Filesize

    276KB

    MD5

    b7b47839865c6fc7a47965cb0a15ede7

    SHA1

    04cbdc9da3b625484f3276762abf9516f1797197

    SHA256

    ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c

    SHA512

    d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c

  • C:\Users\Admin\AppData\Local\Temp\kqegg.exe
    Filesize

    276KB

    MD5

    b7b47839865c6fc7a47965cb0a15ede7

    SHA1

    04cbdc9da3b625484f3276762abf9516f1797197

    SHA256

    ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c

    SHA512

    d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c

  • C:\Users\Admin\AppData\Local\Temp\wvdthhroe.qae
    Filesize

    5KB

    MD5

    c7765f682b89ddbbc6a38ca8847d987c

    SHA1

    e9f8f90ac19b207a702321f10f136b96d7984bf6

    SHA256

    d0963fe8c05f93ce2ab565cac70972e0c64bd746b640c1cb19221e60a6298363

    SHA512

    b5c90356b83baa78d60d4316bdb03d9bfd91730c033d6108617aa3133da9a96dae37177241bb5d13c1379adfbb979d5391f70d177f05f69068c37c9779f24a0c

  • \Users\Admin\AppData\Local\Temp\kqegg.exe
    Filesize

    276KB

    MD5

    b7b47839865c6fc7a47965cb0a15ede7

    SHA1

    04cbdc9da3b625484f3276762abf9516f1797197

    SHA256

    ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c

    SHA512

    d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c

  • \Users\Admin\AppData\Local\Temp\kqegg.exe
    Filesize

    276KB

    MD5

    b7b47839865c6fc7a47965cb0a15ede7

    SHA1

    04cbdc9da3b625484f3276762abf9516f1797197

    SHA256

    ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c

    SHA512

    d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c

  • \Users\Admin\AppData\Local\Temp\kqegg.exe
    Filesize

    276KB

    MD5

    b7b47839865c6fc7a47965cb0a15ede7

    SHA1

    04cbdc9da3b625484f3276762abf9516f1797197

    SHA256

    ff9c7f0f6b66da24407bfc7861618fdc4c0932c00165389ccf218c3cf385641c

    SHA512

    d6a83edfdea850c53500f0c3a8857d01cd018a31dc719577fce908ee84de2d61a5a762485b7aa6db12e82da92e38a803dfb06c45ddaa629a10dbf91538e83c1c

  • memory/560-57-0x0000000000000000-mapping.dmp
  • memory/940-75-0x00000000000C0000-0x00000000000ED000-memory.dmp
    Filesize

    180KB

  • memory/940-76-0x0000000001F70000-0x0000000002273000-memory.dmp
    Filesize

    3.0MB

  • memory/940-80-0x00000000000C0000-0x00000000000ED000-memory.dmp
    Filesize

    180KB

  • memory/940-78-0x0000000000940000-0x00000000009CF000-memory.dmp
    Filesize

    572KB

  • memory/940-74-0x0000000000B60000-0x0000000000B67000-memory.dmp
    Filesize

    28KB

  • memory/940-72-0x0000000000000000-mapping.dmp
  • memory/1104-66-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1104-70-0x0000000000490000-0x00000000004A0000-memory.dmp
    Filesize

    64KB

  • memory/1104-68-0x0000000000230000-0x0000000000240000-memory.dmp
    Filesize

    64KB

  • memory/1104-73-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1104-67-0x0000000000750000-0x0000000000A53000-memory.dmp
    Filesize

    3.0MB

  • memory/1104-65-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/1104-63-0x00000000004012B0-mapping.dmp
  • memory/1232-71-0x0000000006420000-0x000000000656E000-memory.dmp
    Filesize

    1.3MB

  • memory/1232-77-0x0000000006420000-0x000000000656E000-memory.dmp
    Filesize

    1.3MB

  • memory/1232-69-0x0000000005EC0000-0x0000000006013000-memory.dmp
    Filesize

    1.3MB

  • memory/1232-79-0x0000000004100000-0x0000000004244000-memory.dmp
    Filesize

    1.3MB

  • memory/1232-81-0x0000000004100000-0x0000000004244000-memory.dmp
    Filesize

    1.3MB

  • memory/1448-54-0x0000000075441000-0x0000000075443000-memory.dmp
    Filesize

    8KB