Analysis

  • max time kernel
    149s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2023 12:55

General

  • Target

    b561c766f16984cad7bd9303131d69da7cae866a.exe

  • Size

    445KB

  • MD5

    7f86f5c4f81ec48b4b6bfc92b29ec751

  • SHA1

    b561c766f16984cad7bd9303131d69da7cae866a

  • SHA256

    63ec01839919b7f832954e17b9259a74fe90e0217f178dbd5f7661454af4c91f

  • SHA512

    d040eb130075902d49536dca8b1abe4bc49ff6421884a793da73f956bf614806949b89ce602168bdc5a55af111871ee4120654f136914e4e63d2170557806cb3

  • SSDEEP

    12288:3Y7shrtvJ4uNMIL/TJF/DaYVgl5NVx1fFHD02SJZ:3Yu1KA1I/FXngPZ

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

vr84

Decoy

intouchenergy.co.uk

lalumalkaliram.com

hillgreenholidays.co.uk

fluentliteracy.com

buildingworkerpower.com

by23577.com

gate-ch375019.online

jayess-decor.com

larkslife.com

swsnacks.co.uk

bigturtletiny.com

egggge.xyz

olastore.africa

lightshowsnewengland.com

daily-lox.com

empireoba.com

91302events.com

lawrencecountyfirechiefs.com

abrahamslibrary.com

cleaner365.online

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1376
    • C:\Users\Admin\AppData\Local\Temp\b561c766f16984cad7bd9303131d69da7cae866a.exe
      "C:\Users\Admin\AppData\Local\Temp\b561c766f16984cad7bd9303131d69da7cae866a.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1564
      • C:\Users\Admin\AppData\Local\Temp\tbelmde.exe
        "C:\Users\Admin\AppData\Local\Temp\tbelmde.exe" C:\Users\Admin\AppData\Local\Temp\lxirk.jhb
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1932
        • C:\Users\Admin\AppData\Local\Temp\tbelmde.exe
          "C:\Users\Admin\AppData\Local\Temp\tbelmde.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1480
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1724
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\tbelmde.exe"
        3⤵
          PID:2044

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\blqttgnqqaq.qo

      Filesize

      205KB

      MD5

      7e6daa507120f5d554a44c601bbfba58

      SHA1

      4018d5a2de62d2013a6c898828f8a74e814d5c1d

      SHA256

      ca29d66f49018a38a180092513e189a53577092219ff4c8d119b30055913cbe1

      SHA512

      896aaa9adaa33227e0abbac98aa43f4ae2c66d8efc41ba50d452ceea170508f6a049af6621e452eec3b215895cdb0e719c3c9afd34e257b77ff133e591aab1d4

    • C:\Users\Admin\AppData\Local\Temp\lxirk.jhb

      Filesize

      5KB

      MD5

      7611d59c10c085fe2b6f33cb8bc797b9

      SHA1

      8e6a6c47f32c48d1892b664b734c324cd70e0fb0

      SHA256

      1391af011ebe5d6d3bbfd08ad339779d49b65f28260aef59bb4fb490b77c03ab

      SHA512

      2f59ffdc86c719e780b7f07102dd1f3ee53d20f9f1f5464c0ac94495a8da25ddefe94e97499ab7c0da1a5d6bcd71d549da2bfef3d4d85e5d132c6a38534dcf65

    • C:\Users\Admin\AppData\Local\Temp\tbelmde.exe

      Filesize

      12KB

      MD5

      2a653d1ff961008fca702200878c9bf1

      SHA1

      676dbca890fedf5e3fec6e8df688dbf0ef8436f2

      SHA256

      e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba

      SHA512

      15b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8

    • C:\Users\Admin\AppData\Local\Temp\tbelmde.exe

      Filesize

      12KB

      MD5

      2a653d1ff961008fca702200878c9bf1

      SHA1

      676dbca890fedf5e3fec6e8df688dbf0ef8436f2

      SHA256

      e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba

      SHA512

      15b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8

    • C:\Users\Admin\AppData\Local\Temp\tbelmde.exe

      Filesize

      12KB

      MD5

      2a653d1ff961008fca702200878c9bf1

      SHA1

      676dbca890fedf5e3fec6e8df688dbf0ef8436f2

      SHA256

      e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba

      SHA512

      15b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8

    • \Users\Admin\AppData\Local\Temp\tbelmde.exe

      Filesize

      12KB

      MD5

      2a653d1ff961008fca702200878c9bf1

      SHA1

      676dbca890fedf5e3fec6e8df688dbf0ef8436f2

      SHA256

      e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba

      SHA512

      15b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8

    • \Users\Admin\AppData\Local\Temp\tbelmde.exe

      Filesize

      12KB

      MD5

      2a653d1ff961008fca702200878c9bf1

      SHA1

      676dbca890fedf5e3fec6e8df688dbf0ef8436f2

      SHA256

      e1fc47c2cbfda644718c2e519fcc103b8cb43b11b878183648be966082485bba

      SHA512

      15b136b5561d3922113855a9caebe7b4b0813a4b7b28cc7cababa1f546bcb37217155273a7aa4d8ee0e4b54cf480383c4cd002dddf8f416de2e2a4b74ac697d8

    • memory/1376-68-0x0000000006C90000-0x0000000006E35000-memory.dmp

      Filesize

      1.6MB

    • memory/1376-78-0x0000000006E40000-0x0000000006FAA000-memory.dmp

      Filesize

      1.4MB

    • memory/1376-76-0x0000000006E40000-0x0000000006FAA000-memory.dmp

      Filesize

      1.4MB

    • memory/1480-65-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1480-66-0x0000000000A00000-0x0000000000D03000-memory.dmp

      Filesize

      3.0MB

    • memory/1480-67-0x0000000000290000-0x00000000002A5000-memory.dmp

      Filesize

      84KB

    • memory/1480-63-0x000000000041F060-mapping.dmp

    • memory/1564-54-0x0000000075FB1000-0x0000000075FB3000-memory.dmp

      Filesize

      8KB

    • memory/1724-69-0x0000000000000000-mapping.dmp

    • memory/1724-72-0x0000000000CA0000-0x0000000000CAE000-memory.dmp

      Filesize

      56KB

    • memory/1724-73-0x0000000000090000-0x00000000000BF000-memory.dmp

      Filesize

      188KB

    • memory/1724-74-0x00000000020B0000-0x00000000023B3000-memory.dmp

      Filesize

      3.0MB

    • memory/1724-75-0x0000000000960000-0x00000000009F4000-memory.dmp

      Filesize

      592KB

    • memory/1724-77-0x0000000000090000-0x00000000000BF000-memory.dmp

      Filesize

      188KB

    • memory/1932-56-0x0000000000000000-mapping.dmp

    • memory/2044-71-0x0000000000000000-mapping.dmp