Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03-02-2023 16:50

General

  • Target

    Attached Proforma Invoice.exe

  • Size

    678KB

  • MD5

    9f0e000d75cf201d56f68e51a0c43cc5

  • SHA1

    54d6592876e9261109fbd60ae2e078f475f74f1e

  • SHA256

    02033ee5f18dc5c14cca3e808111693ff1b41d8d705268ae55e86251fe6bcc8b

  • SHA512

    fe72606ae529ef5522b7681b66118c516c6f3ea55844441196f1143ab684dba5daee89dfcdf957b291a16ee862d575accdfe1b45837d4ac01645da894492f64e

  • SSDEEP

    12288:+J8P4O2utBLvuQ4ZNn1AjnJzQFftOZCcgy:mIWutBLm/NnoJzQFW

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

n7ak

Decoy

wise-transfer.info

jam-nins.com

thebestsocialcrm.com

majomeow222.com

ancientshadowguilt.space

gentleman-china.com

parquemermoz.store

taxuw.com

sharqiyapaints.com

libraryofkath.com

1949wan.com

synqr.net

bitchessgirls.com

btonu.cfd

coding-bootcamps-16314.com

leadership22-tdh.site

maximsboutique.com

irishsummertruffles.com

sdnaqianchuan.com

uyews.xyz

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Formbook payload 3 IoCs
  • ModiLoader Second Stage 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Program crash 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 18 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1028
    • C:\Users\Admin\AppData\Local\Temp\Attached Proforma Invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\Attached Proforma Invoice.exe"
      2⤵
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4092
      • C:\Windows\SysWOW64\colorcpl.exe
        C:\Windows\System32\colorcpl.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4308
    • C:\Windows\SysWOW64\colorcpl.exe
      "C:\Windows\SysWOW64\colorcpl.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4108
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:3856
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -u -p 3856 -s 116
            4⤵
            • Program crash
            PID:4768
        • C:\Users\Admin\AppData\Local\Temp\nlpxxn.exe
          "C:\Users\Admin\AppData\Local\Temp\nlpxxn.exe"
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:4984
          • C:\Windows\SysWOW64\colorcpl.exe
            C:\Windows\System32\colorcpl.exe
            4⤵
              PID:3276
        • C:\Windows\SysWOW64\WWAHost.exe
          "C:\Windows\SysWOW64\WWAHost.exe"
          2⤵
          • Suspicious use of SetThreadContext
          • Modifies Internet Explorer settings
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2180
          • C:\Windows\SysWOW64\cmd.exe
            /c copy "C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Default\Login Data" "C:\Users\Admin\AppData\Local\Temp\DB1" /V
            3⤵
              PID:4252
            • C:\Program Files\Mozilla Firefox\Firefox.exe
              "C:\Program Files\Mozilla Firefox\Firefox.exe"
              3⤵
                PID:5092
          • C:\Windows\system32\WerFault.exe
            C:\Windows\system32\WerFault.exe -pss -s 456 -p 3856 -ip 3856
            1⤵
              PID:4232

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Modify Registry

            2
            T1112

            Credential Access

            Credentials in Files

            1
            T1081

            Collection

            Data from Local System

            1
            T1005

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
              Filesize

              471B

              MD5

              d9545a8ab2fd646c54b9a96ec9a70eed

              SHA1

              b9a12d859e7131c08902435a1a13d9bda2f652a8

              SHA256

              75d2dd44cc8c4e17aa44c0ab0d5c452647cb3d973636b0181fea139eb751ea09

              SHA512

              f36db1cc63b337028bcfb023fe9964f9a14d2ea6c04a4a4c23d8bd786ef88775f5b87bdef8720dc82c974c616acc4c59c48c65db638e4b1d15c9a70e9894666e

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
              Filesize

              471B

              MD5

              4c5f3aeb4a9c6d544431b1af703b8afd

              SHA1

              b39479394f1eb0e9361574b16275818aca8fb7d4

              SHA256

              5e22cd4fd368dbecbdf6bde50d16c7f21ad362161abe9222368c8abb6fb5cd0a

              SHA512

              eefdd0d7a5f78f67b5593a16269ab225533556b4e13fbf1e2533f90b0b486d9a4981b2fc9e4f502b32b850627b6e5e8e6a4cbc471b64d911ae27c6ef6eb6c8c1

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_C5130A0BDC8C859A2757D77746C10868
              Filesize

              442B

              MD5

              a4a24707cc3f9951efdedf833f0cb906

              SHA1

              80c9d2d217bf4b29ab6c74fe51797b11aeb0ebfe

              SHA256

              ff889c18237cc8dc6af3ac515fe08b13f7d7cf4ab6d9e1c3cb4e2a92f701d1fb

              SHA512

              c54b505587f948e1d5b60f5f202f488b5b8035f8f02e83f979c237a26d83475298d0260407ac6884662f4fe9dbd5da1c0dedaaede876947686a6bf9fda00114d

            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\80237EE4964FC9C409AAF55BF996A292_D46D6FA25B74360E1349F9015B5CCE53
              Filesize

              412B

              MD5

              91e3a500d39796e15ff6918a25b4d92d

              SHA1

              4fe9aa0b537fab396c1180d312fbba49ac3b5223

              SHA256

              37a49d6b14acd933feda94bd4c80ceefbc567e9e0365f72ee9ebe0e022334818

              SHA512

              96e4fd31dc071209b459f96574ee61c2bab310ac176405fce8ae0ca43964645e98e38b012aded11d2a8440683a408750f37957a0a87874a9f50cca9325076aea

            • C:\Users\Admin\AppData\Local\Temp\DB1
              Filesize

              40KB

              MD5

              b608d407fc15adea97c26936bc6f03f6

              SHA1

              953e7420801c76393902c0d6bb56148947e41571

              SHA256

              b281ce54125d4250a80f48fcc02a8eea53f2c35c3b726e2512c3d493da0013bf

              SHA512

              cc96ddf4bf90d6aaa9d86803cb2aa30cd8e9b295aee1bd5544b88aeab63dc60bb1d4641e846c9771bab51aabbfbcd984c6d3ee83b96f5b65d09c0841d464b9e4

            • C:\Users\Admin\AppData\Local\Temp\nlpxxn.exe
              Filesize

              653KB

              MD5

              b4245bf071b448031e9f44a82d32064b

              SHA1

              5e8e1c0a5b827e167bb02ea9509c60fa1ca4cdcd

              SHA256

              74f21132a0caeb41277081f38b8372182a7b0d32af5fb589002be9123ce63d0f

              SHA512

              13174d7e489a019c3144431a1236fc0cca62878c7c3b169aea09098e9c73978c4862f389dcab04b0860fd6d9c184bc0baed20a254e817a5a5f1a5fd78d3da9b2

            • C:\Users\Admin\AppData\Local\Temp\nlpxxn.exe
              Filesize

              653KB

              MD5

              b4245bf071b448031e9f44a82d32064b

              SHA1

              5e8e1c0a5b827e167bb02ea9509c60fa1ca4cdcd

              SHA256

              74f21132a0caeb41277081f38b8372182a7b0d32af5fb589002be9123ce63d0f

              SHA512

              13174d7e489a019c3144431a1236fc0cca62878c7c3b169aea09098e9c73978c4862f389dcab04b0860fd6d9c184bc0baed20a254e817a5a5f1a5fd78d3da9b2

            • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologim.jpeg
              Filesize

              77KB

              MD5

              32db92ca5b13999dd6b01e33fc78e9f3

              SHA1

              f1ab4e463f6e98b74148715f0693c26fd6346c2e

              SHA256

              656ae9b4e54749e2a545e4b93d2e03ccc0b0d809ee1ae4ce5d2eca057865a8b0

              SHA512

              8bab39667290ed0974624853a1fc5762094f2a3fa5d8bb6739b2d3939abd05daf7f37d1d498340dea208b34d340b67ecfa584ee56fb022756a8f39c9b8733aee

            • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrf.ini
              Filesize

              40B

              MD5

              2f245469795b865bdd1b956c23d7893d

              SHA1

              6ad80b974d3808f5a20ea1e766c7d2f88b9e5895

              SHA256

              1662d01a2d47b875a34fc7a8cd92e78cb2ba7f34023c7fd2639cbb10b8d94361

              SHA512

              909f189846a5d2db208a5eb2e7cb3042c0f164caf437e2b1b6de608c0a70e4f3510b81b85753dbeec1e211e6a83e6ea8c96aff896e9b6e8ed42014473a54dc4f

            • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrg.ini
              Filesize

              38B

              MD5

              4aadf49fed30e4c9b3fe4a3dd6445ebe

              SHA1

              1e332822167c6f351b99615eada2c30a538ff037

              SHA256

              75034beb7bded9aeab5748f4592b9e1419256caec474065d43e531ec5cc21c56

              SHA512

              eb5b3908d5e7b43ba02165e092f05578f45f15a148b4c3769036aa542c23a0f7cd2bc2770cf4119a7e437de3f681d9e398511f69f66824c516d9b451bb95f945

            • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologri.ini
              Filesize

              40B

              MD5

              d63a82e5d81e02e399090af26db0b9cb

              SHA1

              91d0014c8f54743bba141fd60c9d963f869d76c9

              SHA256

              eaece2eba6310253249603033c744dd5914089b0bb26bde6685ec9813611baae

              SHA512

              38afb05016d8f3c69d246321573997aaac8a51c34e61749a02bf5e8b2b56b94d9544d65801511044e1495906a86dc2100f2e20ff4fcbed09e01904cc780fdbad

            • C:\Users\Admin\AppData\Roaming\94O2R65S\94Ologrv.ini
              Filesize

              872B

              MD5

              bbc41c78bae6c71e63cb544a6a284d94

              SHA1

              33f2c1d9fa0e9c99b80bc2500621e95af38b1f9a

              SHA256

              ee83c6bcea9353c74bfc0a7e739f3c4a765ace894470e09cdcdebba700b8d4cb

              SHA512

              0aea424b57adae3e14ad6491cab585f554b4dffe601b5a17bad6ee6177d2f0f995e419cde576e2d1782b9bddc0661aada11a2c9f1454ae625d9e3223635ec9f4

            • memory/1028-164-0x0000000008020000-0x0000000008100000-memory.dmp
              Filesize

              896KB

            • memory/1028-141-0x0000000002740000-0x00000000027F6000-memory.dmp
              Filesize

              728KB

            • memory/1028-147-0x0000000007F20000-0x0000000008012000-memory.dmp
              Filesize

              968KB

            • memory/1028-148-0x0000000007F20000-0x0000000008012000-memory.dmp
              Filesize

              968KB

            • memory/1028-174-0x0000000008100000-0x00000000081F6000-memory.dmp
              Filesize

              984KB

            • memory/1028-175-0x0000000008100000-0x00000000081F6000-memory.dmp
              Filesize

              984KB

            • memory/2180-168-0x0000000000EC0000-0x0000000000F9C000-memory.dmp
              Filesize

              880KB

            • memory/2180-165-0x0000000000000000-mapping.dmp
            • memory/2180-173-0x0000000001BD0000-0x0000000001C63000-memory.dmp
              Filesize

              588KB

            • memory/2180-170-0x0000000001D90000-0x00000000020DA000-memory.dmp
              Filesize

              3.3MB

            • memory/2180-169-0x0000000000D90000-0x0000000000DBF000-memory.dmp
              Filesize

              188KB

            • memory/3276-158-0x0000000000000000-mapping.dmp
            • memory/4092-135-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4092-136-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4092-132-0x0000000002850000-0x000000000287C000-memory.dmp
              Filesize

              176KB

            • memory/4108-142-0x0000000000000000-mapping.dmp
            • memory/4108-163-0x00000000058E0000-0x00000000058F4000-memory.dmp
              Filesize

              80KB

            • memory/4108-143-0x0000000000EB0000-0x0000000000EC9000-memory.dmp
              Filesize

              100KB

            • memory/4108-162-0x0000000005B40000-0x0000000005E8A000-memory.dmp
              Filesize

              3.3MB

            • memory/4108-166-0x0000000000D50000-0x0000000000DDF000-memory.dmp
              Filesize

              572KB

            • memory/4108-167-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4108-146-0x0000000000D50000-0x0000000000DDF000-memory.dmp
              Filesize

              572KB

            • memory/4108-145-0x00000000022E0000-0x000000000262A000-memory.dmp
              Filesize

              3.3MB

            • memory/4108-144-0x0000000000440000-0x000000000046D000-memory.dmp
              Filesize

              180KB

            • memory/4252-171-0x0000000000000000-mapping.dmp
            • memory/4308-140-0x0000000005160000-0x0000000005170000-memory.dmp
              Filesize

              64KB

            • memory/4308-139-0x00000000052A0000-0x00000000055EA000-memory.dmp
              Filesize

              3.3MB

            • memory/4308-138-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4308-137-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4308-134-0x0000000000000000-mapping.dmp
            • memory/4984-152-0x0000000003E10000-0x0000000003E3C000-memory.dmp
              Filesize

              176KB

            • memory/4984-159-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4984-160-0x0000000010410000-0x000000001043F000-memory.dmp
              Filesize

              188KB

            • memory/4984-149-0x0000000000000000-mapping.dmp