Analysis

  • max time kernel
    150s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    15-12-2022 14:55

General

  • Target

    32398cba360318425a3f1ba57676cba07546d5419e4d5f041752273ea389da33.exe

  • Size

    213KB

  • MD5

    ace23ae0a5524989a50081e0416cd06f

  • SHA1

    d5ee9183be486bf153d7666ca4301e600ea06087

  • SHA256

    32398cba360318425a3f1ba57676cba07546d5419e4d5f041752273ea389da33

  • SHA512

    9ae64c7e067d123357887951cbb4e5dfa1876a4a8febb41f6e9065e9c0cf0aaf68f4c0a449fe89ec46d51a807c545609b005bdbe4efdc34128a1c1de2287ed4f

  • SSDEEP

    6144:QBn17YpPP72F3ApRMkW5lYeXzYMXAkqs1ZOcABcqGKq:g7YpH1RepXACZGAN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

je14

Decoy

innervisionbuildings.com

theenergysocialite.com

565548.com

panghr.com

onlyonesolutions.com

stjohnzone6.com

cnotes.rest

helfeb.online

xixi-s-inc.club

easilyentered.com

theshopx.store

mrclean-ac.com

miamibeachwateradventures.com

jpearce.co.uk

seseragi-bunkou.com

minimaddie.com

commbank-help-849c3.com

segohandelsonderneming.com

namthanhreal.com

fototerapi.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1372
    • C:\Users\Admin\AppData\Local\Temp\32398cba360318425a3f1ba57676cba07546d5419e4d5f041752273ea389da33.exe
      "C:\Users\Admin\AppData\Local\Temp\32398cba360318425a3f1ba57676cba07546d5419e4d5f041752273ea389da33.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe
        "C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe" C:\Users\Admin\AppData\Local\Temp\rdsdqatpbhs.z
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:804
        • C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe
          "C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1448
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe"
        3⤵
          PID:1136

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gvffc.ytu
      Filesize

      185KB

      MD5

      0259fde3e396b0abdf865d2227a3e1b6

      SHA1

      d9d03d8050e968b192bb1fc112fe28d53df4bded

      SHA256

      ca6c0d21f3ea9f6a8c67f0ba534ab394fd05b3ecfa6576428cea4ce42adb6861

      SHA512

      8ba17292d2fb3a0324e49bd5c490c3a2139c7079290399709582131d26d061f1eaddb5c8e5363bf79797bf55e34f791b3c0c7eb64eb3756fc8bdd00e79c3dd9c

    • C:\Users\Admin\AppData\Local\Temp\rdsdqatpbhs.z
      Filesize

      6KB

      MD5

      b34b9ffd1150f121d29fcd48c89d7de4

      SHA1

      fe76263983ef50bb1f46c44e3ee1d85c87cb56d9

      SHA256

      ecc775d058ed2b1f6746748a3e28e3117188225e3c63766250e3b4287c6fe538

      SHA512

      a820cf2892b3569af35477f2bd26d7e44121f165214ca9dec9de0d26e8831751f04e57d3409e9cdfb3dc81b1c2b21072b0c8a73caa4fa2a24fd53c324054e476

    • C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe
      Filesize

      12KB

      MD5

      d5a51803072a4fc064ba840fa97b052c

      SHA1

      29b163435bb0e4d7e7532108af9fdf2d346ad204

      SHA256

      52f984ff112c1b873209cacafecf5e774bb4100083a9049e741b93baaa63b75b

      SHA512

      c9f15cefd8a002dbba8a1cf80299b227e82a867824346739521ca1d671908842f29aa837b8da01e7c42a11af39597a8969a055a0ef87076ca1dccfea82f8da73

    • C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe
      Filesize

      12KB

      MD5

      d5a51803072a4fc064ba840fa97b052c

      SHA1

      29b163435bb0e4d7e7532108af9fdf2d346ad204

      SHA256

      52f984ff112c1b873209cacafecf5e774bb4100083a9049e741b93baaa63b75b

      SHA512

      c9f15cefd8a002dbba8a1cf80299b227e82a867824346739521ca1d671908842f29aa837b8da01e7c42a11af39597a8969a055a0ef87076ca1dccfea82f8da73

    • C:\Users\Admin\AppData\Local\Temp\vpxpxta.exe
      Filesize

      12KB

      MD5

      d5a51803072a4fc064ba840fa97b052c

      SHA1

      29b163435bb0e4d7e7532108af9fdf2d346ad204

      SHA256

      52f984ff112c1b873209cacafecf5e774bb4100083a9049e741b93baaa63b75b

      SHA512

      c9f15cefd8a002dbba8a1cf80299b227e82a867824346739521ca1d671908842f29aa837b8da01e7c42a11af39597a8969a055a0ef87076ca1dccfea82f8da73

    • \Users\Admin\AppData\Local\Temp\vpxpxta.exe
      Filesize

      12KB

      MD5

      d5a51803072a4fc064ba840fa97b052c

      SHA1

      29b163435bb0e4d7e7532108af9fdf2d346ad204

      SHA256

      52f984ff112c1b873209cacafecf5e774bb4100083a9049e741b93baaa63b75b

      SHA512

      c9f15cefd8a002dbba8a1cf80299b227e82a867824346739521ca1d671908842f29aa837b8da01e7c42a11af39597a8969a055a0ef87076ca1dccfea82f8da73

    • \Users\Admin\AppData\Local\Temp\vpxpxta.exe
      Filesize

      12KB

      MD5

      d5a51803072a4fc064ba840fa97b052c

      SHA1

      29b163435bb0e4d7e7532108af9fdf2d346ad204

      SHA256

      52f984ff112c1b873209cacafecf5e774bb4100083a9049e741b93baaa63b75b

      SHA512

      c9f15cefd8a002dbba8a1cf80299b227e82a867824346739521ca1d671908842f29aa837b8da01e7c42a11af39597a8969a055a0ef87076ca1dccfea82f8da73

    • memory/804-56-0x0000000000000000-mapping.dmp
    • memory/864-68-0x0000000000000000-mapping.dmp
    • memory/864-76-0x00000000000C0000-0x00000000000EF000-memory.dmp
      Filesize

      188KB

    • memory/864-74-0x0000000001DA0000-0x0000000001E33000-memory.dmp
      Filesize

      588KB

    • memory/864-73-0x0000000001F60000-0x0000000002263000-memory.dmp
      Filesize

      3.0MB

    • memory/864-71-0x0000000000460000-0x000000000047F000-memory.dmp
      Filesize

      124KB

    • memory/864-72-0x00000000000C0000-0x00000000000EF000-memory.dmp
      Filesize

      188KB

    • memory/1136-70-0x0000000000000000-mapping.dmp
    • memory/1280-54-0x0000000075811000-0x0000000075813000-memory.dmp
      Filesize

      8KB

    • memory/1372-67-0x00000000070D0000-0x000000000726C000-memory.dmp
      Filesize

      1.6MB

    • memory/1372-75-0x00000000063F0000-0x00000000064D0000-memory.dmp
      Filesize

      896KB

    • memory/1372-77-0x00000000063F0000-0x00000000064D0000-memory.dmp
      Filesize

      896KB

    • memory/1448-66-0x0000000000150000-0x0000000000164000-memory.dmp
      Filesize

      80KB

    • memory/1448-65-0x0000000000AE0000-0x0000000000DE3000-memory.dmp
      Filesize

      3.0MB

    • memory/1448-64-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1448-62-0x000000000041F120-mapping.dmp