Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    13-12-2022 15:43

General

  • Target

    RFQ PT089110.exe

  • Size

    272KB

  • MD5

    8ea739a14035ea523b015f33eafe6953

  • SHA1

    228ee69b1fccea68b79f9c1a9bb9796882696cf3

  • SHA256

    1a685538deaab9e0cfe393b43f4f08e48c076ce115911c46e93952a121322c87

  • SHA512

    76d462569c16143c41ce75eb8e5f4f6304f32f42f939433752a5aa3fefcfa4550da8a55179dfef2d3eef0c6a41a9de8018de785669bfc6daf337a14323f98f2a

  • SSDEEP

    6144:9kwrUMSvXxBADF+bVEN8fyqNkpHVtxgWljiXcU0GfJyqI2q:/UMEBBAAJVfjS1EWljiXcU0EJyqy

Malware Config

Extracted

Family

formbook

Campaign

m5oe

Decoy

HdR8hG6r12hBYuHY4zv6YeeFPQ==

tD1V9gswYvgQXEGd

1xKtJ1LdqRYMRMC84U1A

MbhjiWb7Lz8z7KIWl3UyUIJwA6Tb

joVB5Xggy2RtE+odsZg=

TrduAIay6Y3SvoIK20xI

pSna7LOsXXwXT/zz3Iow4g==

QnthmO4Qst5gC3sDoA==

eAirzOOgO7SOCenz3Iow4g==

xg0uSbfLTg==

YWQXwyGRzPEHzGrDFE8CBSE=

ujLnfuXoH9dbgHIK20xI

291v0XsGFrYQXEGd

MRvTd/qMuaHpjCM=

X131fLC6VWX4MsvCb2IPjIfq8wlksWfg

Y9Bur8DbgqFt/Yni86MMCCE=

q6RTBmJkmy5pWTmmCCrvmuCDPw==

mQS26DojT+EQXEGd

sjHQ+Kav2Wx9FeodsZg=

JA24UKnTA5re1LhcQaVo/w==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1444
    • C:\Users\Admin\AppData\Local\Temp\RFQ PT089110.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ PT089110.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1248
      • C:\Users\Admin\AppData\Local\Temp\faclv.exe
        "C:\Users\Admin\AppData\Local\Temp\faclv.exe" C:\Users\Admin\AppData\Local\Temp\jjqrtywbglb.t
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:860
        • C:\Users\Admin\AppData\Local\Temp\faclv.exe
          "C:\Users\Admin\AppData\Local\Temp\faclv.exe"
          4⤵
          • Executes dropped EXE
          • Checks computer location settings
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1988
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:880
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1476

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    1
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\faclv.exe
      Filesize

      141KB

      MD5

      f88b0229271ec4a4962ade420916973f

      SHA1

      8c3eff757988b1b43213b85dd272af0289a85f2f

      SHA256

      e66c55f14ddcfb93aa5f236b67829bc4b43916e1ff84bf89ee90275bc873729e

      SHA512

      f09c5cc0a50169582d0578fb2959a15841394c2a391b7a31be8a6e2cd90586b37b18e39d3395e176a250ac5dbba1db091206c3b3364221ec92cde78a182dba53

    • C:\Users\Admin\AppData\Local\Temp\faclv.exe
      Filesize

      141KB

      MD5

      f88b0229271ec4a4962ade420916973f

      SHA1

      8c3eff757988b1b43213b85dd272af0289a85f2f

      SHA256

      e66c55f14ddcfb93aa5f236b67829bc4b43916e1ff84bf89ee90275bc873729e

      SHA512

      f09c5cc0a50169582d0578fb2959a15841394c2a391b7a31be8a6e2cd90586b37b18e39d3395e176a250ac5dbba1db091206c3b3364221ec92cde78a182dba53

    • C:\Users\Admin\AppData\Local\Temp\faclv.exe
      Filesize

      141KB

      MD5

      f88b0229271ec4a4962ade420916973f

      SHA1

      8c3eff757988b1b43213b85dd272af0289a85f2f

      SHA256

      e66c55f14ddcfb93aa5f236b67829bc4b43916e1ff84bf89ee90275bc873729e

      SHA512

      f09c5cc0a50169582d0578fb2959a15841394c2a391b7a31be8a6e2cd90586b37b18e39d3395e176a250ac5dbba1db091206c3b3364221ec92cde78a182dba53

    • C:\Users\Admin\AppData\Local\Temp\jjqrtywbglb.t
      Filesize

      5KB

      MD5

      c4da7b1938a01beace3d69275e1826f9

      SHA1

      bb7e8c0d6b9e404551d45e9d1701a49a6aa41eda

      SHA256

      7d1696aa4c800e800aa5b49124b66cc00e94d155e78cd06aece207a9d7b7e47d

      SHA512

      9a6493fb8eaee411248e0eb65b134baee7d2746d9ff0af493f7083c6403f80c1c0588971409e2c1a5d785b674b029eaf6122d2f60bce7cc16154d91947e97fb0

    • C:\Users\Admin\AppData\Local\Temp\zhphjyjg.axk
      Filesize

      185KB

      MD5

      c290c052854d20566294229800e4471d

      SHA1

      eb4cef65b362a4ade2977078286e60b06551d2c3

      SHA256

      69c12b29ea58482fa5a07f00810e350c9436d40808f4b9bcc6567b32f8104255

      SHA512

      d199fc2fed053c1d5107084fd9930630bcb297ce281b3fdc62e83ecf641e62f1b9d64049b446f9d546347ca025305dd4f699defb1c661a1646dd9583a0207d7d

    • \Users\Admin\AppData\Local\Temp\faclv.exe
      Filesize

      141KB

      MD5

      f88b0229271ec4a4962ade420916973f

      SHA1

      8c3eff757988b1b43213b85dd272af0289a85f2f

      SHA256

      e66c55f14ddcfb93aa5f236b67829bc4b43916e1ff84bf89ee90275bc873729e

      SHA512

      f09c5cc0a50169582d0578fb2959a15841394c2a391b7a31be8a6e2cd90586b37b18e39d3395e176a250ac5dbba1db091206c3b3364221ec92cde78a182dba53

    • \Users\Admin\AppData\Local\Temp\faclv.exe
      Filesize

      141KB

      MD5

      f88b0229271ec4a4962ade420916973f

      SHA1

      8c3eff757988b1b43213b85dd272af0289a85f2f

      SHA256

      e66c55f14ddcfb93aa5f236b67829bc4b43916e1ff84bf89ee90275bc873729e

      SHA512

      f09c5cc0a50169582d0578fb2959a15841394c2a391b7a31be8a6e2cd90586b37b18e39d3395e176a250ac5dbba1db091206c3b3364221ec92cde78a182dba53

    • \Users\Admin\AppData\Local\Temp\sqlite3.dll
      Filesize

      828KB

      MD5

      d5ea9b5814553bd2f9bbb8bf0ea94ed6

      SHA1

      29629836c088dcd968efb321832edcbcfaac5b51

      SHA256

      5ea67d6b7f67301ca214af511740f26b9e6cc9e16b2c0ec7bba071d05b9bde78

      SHA512

      6867452995c8354622fe22ce4fb4868d2b9cb28bb31aa60b42f06e494b952f66c427aa66c7af09240954bf55ebcde62d4c7feb9d99e742ea3bc5beb3756a7a1e

    • memory/860-56-0x0000000000000000-mapping.dmp
    • memory/880-74-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/880-75-0x0000000002410000-0x0000000002713000-memory.dmp
      Filesize

      3.0MB

    • memory/880-78-0x0000000000080000-0x00000000000AD000-memory.dmp
      Filesize

      180KB

    • memory/880-76-0x0000000000B10000-0x0000000000B9F000-memory.dmp
      Filesize

      572KB

    • memory/880-73-0x0000000000BA0000-0x0000000000E21000-memory.dmp
      Filesize

      2.5MB

    • memory/880-72-0x0000000074D11000-0x0000000074D13000-memory.dmp
      Filesize

      8KB

    • memory/880-70-0x0000000000000000-mapping.dmp
    • memory/1248-54-0x0000000075351000-0x0000000075353000-memory.dmp
      Filesize

      8KB

    • memory/1444-69-0x0000000004840000-0x0000000004957000-memory.dmp
      Filesize

      1.1MB

    • memory/1444-77-0x0000000004970000-0x0000000004A49000-memory.dmp
      Filesize

      868KB

    • memory/1444-79-0x0000000004970000-0x0000000004A49000-memory.dmp
      Filesize

      868KB

    • memory/1988-68-0x0000000000320000-0x0000000000330000-memory.dmp
      Filesize

      64KB

    • memory/1988-65-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1988-67-0x00000000008E0000-0x0000000000BE3000-memory.dmp
      Filesize

      3.0MB

    • memory/1988-66-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1988-63-0x00000000004012B0-mapping.dmp