Analysis

  • max time kernel
    155s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08-02-2023 14:17

General

  • Target

    Original Shipping documents.exe

  • Size

    785KB

  • MD5

    d511e5a0e42309e6148b3e7f6b9e5bcf

  • SHA1

    858aade78f8463bca167656c81022f20a7535fb9

  • SHA256

    342215db36f2fa15a4b72d54cb4e7a7179462dcaab9dc9f791336df867d6d286

  • SHA512

    ea71544cdc672051dd8b04fb5ec08853fd2c04994b93a1fc1d61f5efcd2a18ac63f01dd9fb64a398eac1e701762aff019886a2baebf971ec4be4aee4b8ea381d

  • SSDEEP

    24576:IrxN5IC54TWMnp74YTKza8D7ajPhVoo6dlSA:Etgim8QeLmPIvdn

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gg62

Decoy

growfast.africa

lerema.com

38945.se

wheelfermotors.africa

giftshareforyou.online

burrismktg.com

keepgrowing.uk

efefhomeless.buzz

bryanokoh.com

fashion-clothing-40094.com

andreasunshine.com

naijahood.africa

aditrirealty.com

kinnoitodatsumou.com

cryptoqzclimax.com

hairly.biz

comeuphither4.com

integrity360.ltd

flushywhole.com

8869365.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 38 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2824
    • C:\Users\Admin\AppData\Local\Temp\Original Shipping documents.exe
      "C:\Users\Admin\AppData\Local\Temp\Original Shipping documents.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Users\Admin\AppData\Local\Temp\Original Shipping documents.exe
        "C:\Users\Admin\AppData\Local\Temp\Original Shipping documents.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:64
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4264
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Original Shipping documents.exe"
        3⤵
          PID:1956

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/64-144-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/64-137-0x0000000000000000-mapping.dmp
    • memory/64-138-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/64-140-0x0000000001950000-0x0000000001C9A000-memory.dmp
      Filesize

      3.3MB

    • memory/64-141-0x0000000001470000-0x0000000001484000-memory.dmp
      Filesize

      80KB

    • memory/1080-133-0x0000000005D10000-0x00000000062B4000-memory.dmp
      Filesize

      5.6MB

    • memory/1080-134-0x0000000005800000-0x0000000005892000-memory.dmp
      Filesize

      584KB

    • memory/1080-135-0x00000000058A0000-0x00000000058AA000-memory.dmp
      Filesize

      40KB

    • memory/1080-136-0x00000000094C0000-0x000000000955C000-memory.dmp
      Filesize

      624KB

    • memory/1080-132-0x0000000000D90000-0x0000000000E5A000-memory.dmp
      Filesize

      808KB

    • memory/1956-148-0x0000000000000000-mapping.dmp
    • memory/2824-142-0x0000000003290000-0x0000000003375000-memory.dmp
      Filesize

      916KB

    • memory/2824-150-0x0000000008550000-0x00000000086A1000-memory.dmp
      Filesize

      1.3MB

    • memory/2824-152-0x0000000008550000-0x00000000086A1000-memory.dmp
      Filesize

      1.3MB

    • memory/4264-143-0x0000000000000000-mapping.dmp
    • memory/4264-145-0x0000000000EE0000-0x0000000000F37000-memory.dmp
      Filesize

      348KB

    • memory/4264-146-0x0000000000AC0000-0x0000000000AEF000-memory.dmp
      Filesize

      188KB

    • memory/4264-147-0x0000000002D80000-0x00000000030CA000-memory.dmp
      Filesize

      3.3MB

    • memory/4264-149-0x0000000002960000-0x00000000029F3000-memory.dmp
      Filesize

      588KB

    • memory/4264-151-0x0000000000AC0000-0x0000000000AEF000-memory.dmp
      Filesize

      188KB