Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2023, 19:46

General

  • Target

    ENQUIRY SO NO - 270.exe

  • Size

    1.1MB

  • MD5

    e9ad14c57de3288fd9de4d5cdcbf66e0

  • SHA1

    c21ec1560b66e3e4581a8c6cb41fa769527cfd7a

  • SHA256

    7ce7ca5deeb35f3cce19ca4e01e28aebe9f1b03dc8778a2e85e0d515a6df1a3e

  • SHA512

    61199ba16efbe0036e909a05b46ce41a36b019bc6af9cdd8c39bde1ff595d0309bbaca766820c9bfef9d221d3bc850cd5f7e42729fc43a1d5d6a1fb6c8236ba5

  • SSDEEP

    24576:e0pUTyvWX1Qf+cBX0RxfAx5lv2s6MDYTbJNkj:TUT3XTcR0zIBv2lMDYTbJNM

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

oi05

Decoy

fluidavail.online

blchain.tech

kyocera.website

sangmine.xyz

thepolicyjacket.info

ssvhelpman.net

y-t-design.com

eminentabroad.com

codingcamp.store

bester.capital

tanjiya23.site

bheniamyn.dev

top5monitor.com

bit-prim.trade

airstreamsocialclub.com

darkwarspod.com

zazisalesdistribution.com

vivolentlo.online

daftburo.net

elemangelsin.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 46 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:512
    • C:\Users\Admin\AppData\Local\Temp\ENQUIRY SO NO - 270.exe
      "C:\Users\Admin\AppData\Local\Temp\ENQUIRY SO NO - 270.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3448
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\nLaCRhtjINQTQ.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1712
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\nLaCRhtjINQTQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp196.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:3164
      • C:\Users\Admin\AppData\Local\Temp\ENQUIRY SO NO - 270.exe
        "C:\Users\Admin\AppData\Local\Temp\ENQUIRY SO NO - 270.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:260
    • C:\Windows\SysWOW64\raserver.exe
      "C:\Windows\SysWOW64\raserver.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3492
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\ENQUIRY SO NO - 270.exe"
        3⤵
          PID:3680

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp196.tmp

      Filesize

      1KB

      MD5

      cc38a3204a941075d2f0215103a81a72

      SHA1

      ca09882a10d02f7f409810a45d87649f1527bb87

      SHA256

      7c8d4eadbb5ea5130a1c219a4ab3d9f23a8943e296d091d30f221a3290c7c1ef

      SHA512

      a4fe7000127d38728b1968332fe6e673de3ba579801aa065d3c43d3f7ecf6eeedb643168a97e015f41cb5974e7203a2542cd6c2bc93ec90923d27c617c3d5c73

    • memory/260-160-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/260-143-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/260-150-0x0000000001420000-0x0000000001434000-memory.dmp

      Filesize

      80KB

    • memory/260-149-0x0000000001900000-0x0000000001C4A000-memory.dmp

      Filesize

      3.3MB

    • memory/512-171-0x0000000008A20000-0x0000000008B5C000-memory.dmp

      Filesize

      1.2MB

    • memory/512-169-0x0000000008A20000-0x0000000008B5C000-memory.dmp

      Filesize

      1.2MB

    • memory/512-151-0x0000000008810000-0x000000000895B000-memory.dmp

      Filesize

      1.3MB

    • memory/1712-153-0x0000000071410000-0x000000007145C000-memory.dmp

      Filesize

      304KB

    • memory/1712-157-0x0000000006D50000-0x0000000006D5A000-memory.dmp

      Filesize

      40KB

    • memory/1712-142-0x0000000004BD0000-0x00000000051F8000-memory.dmp

      Filesize

      6.2MB

    • memory/1712-144-0x0000000004920000-0x0000000004942000-memory.dmp

      Filesize

      136KB

    • memory/1712-145-0x0000000004B40000-0x0000000004BA6000-memory.dmp

      Filesize

      408KB

    • memory/1712-146-0x00000000053B0000-0x0000000005416000-memory.dmp

      Filesize

      408KB

    • memory/1712-148-0x00000000059E0000-0x00000000059FE000-memory.dmp

      Filesize

      120KB

    • memory/1712-167-0x0000000007000000-0x0000000007008000-memory.dmp

      Filesize

      32KB

    • memory/1712-139-0x00000000020F0000-0x0000000002126000-memory.dmp

      Filesize

      216KB

    • memory/1712-166-0x0000000007020000-0x000000000703A000-memory.dmp

      Filesize

      104KB

    • memory/1712-165-0x0000000006F10000-0x0000000006F1E000-memory.dmp

      Filesize

      56KB

    • memory/1712-152-0x0000000005FC0000-0x0000000005FF2000-memory.dmp

      Filesize

      200KB

    • memory/1712-155-0x0000000007330000-0x00000000079AA000-memory.dmp

      Filesize

      6.5MB

    • memory/1712-156-0x0000000006CE0000-0x0000000006CFA000-memory.dmp

      Filesize

      104KB

    • memory/1712-154-0x0000000005F80000-0x0000000005F9E000-memory.dmp

      Filesize

      120KB

    • memory/1712-158-0x0000000006F60000-0x0000000006FF6000-memory.dmp

      Filesize

      600KB

    • memory/3448-134-0x00000000053D0000-0x0000000005462000-memory.dmp

      Filesize

      584KB

    • memory/3448-132-0x0000000000900000-0x0000000000A16000-memory.dmp

      Filesize

      1.1MB

    • memory/3448-135-0x0000000005560000-0x000000000556A000-memory.dmp

      Filesize

      40KB

    • memory/3448-136-0x0000000007B40000-0x0000000007BDC000-memory.dmp

      Filesize

      624KB

    • memory/3448-133-0x00000000058E0000-0x0000000005E84000-memory.dmp

      Filesize

      5.6MB

    • memory/3492-168-0x0000000003070000-0x0000000003103000-memory.dmp

      Filesize

      588KB

    • memory/3492-164-0x0000000002D20000-0x000000000306A000-memory.dmp

      Filesize

      3.3MB

    • memory/3492-162-0x0000000000E30000-0x0000000000E5F000-memory.dmp

      Filesize

      188KB

    • memory/3492-170-0x0000000000E30000-0x0000000000E5F000-memory.dmp

      Filesize

      188KB

    • memory/3492-161-0x0000000000FD0000-0x0000000000FEF000-memory.dmp

      Filesize

      124KB