Analysis

  • max time kernel
    151s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14-02-2023 09:06

General

  • Target

    SKMBT-283202109080.pdf.exe

  • Size

    570KB

  • MD5

    1b2504eaa55097312bfb5e80d81cf897

  • SHA1

    7c58194fdc6db2123a9f90cb0b921a1859158fbe

  • SHA256

    2fb0a24e905687a5443fbe50d21033e4318da3275260bd82d016a9af346bb09b

  • SHA512

    acf0d7dd8b019d69b6d749ba01ec5a37c4b59fe7e8dd3d8458114d093ad364e6e637500ee15688f58f393458b9f7bb9bac3d160e495d8a171992486dc5ad2184

  • SSDEEP

    12288:EVFFZ6qCmhX6OibPBNXB2Fx2JUkcLtRosYEykcvjSCCMO6apu:i63mlSjmqUkOtusYjkcY1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gg62

Decoy

growfast.africa

lerema.com

38945.se

wheelfermotors.africa

giftshareforyou.online

burrismktg.com

keepgrowing.uk

efefhomeless.buzz

bryanokoh.com

fashion-clothing-40094.com

andreasunshine.com

naijahood.africa

aditrirealty.com

kinnoitodatsumou.com

cryptoqzclimax.com

hairly.biz

comeuphither4.com

integrity360.ltd

flushywhole.com

8869365.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2764
    • C:\Users\Admin\AppData\Local\Temp\SKMBT-283202109080.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\SKMBT-283202109080.pdf.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:4584
      • C:\Users\Admin\AppData\Local\Temp\SKMBT-283202109080.pdf.exe
        "C:\Users\Admin\AppData\Local\Temp\SKMBT-283202109080.pdf.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2156
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4780
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\SKMBT-283202109080.pdf.exe"
        3⤵
          PID:3168

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2156-137-0x0000000000000000-mapping.dmp
    • memory/2156-142-0x0000000001560000-0x0000000001574000-memory.dmp
      Filesize

      80KB

    • memory/2156-141-0x0000000001660000-0x00000000019AA000-memory.dmp
      Filesize

      3.3MB

    • memory/2156-140-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/2156-138-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/2764-157-0x0000000002450000-0x0000000002460000-memory.dmp
      Filesize

      64KB

    • memory/2764-160-0x0000000002450000-0x0000000002460000-memory.dmp
      Filesize

      64KB

    • memory/2764-165-0x0000000002980000-0x0000000002990000-memory.dmp
      Filesize

      64KB

    • memory/2764-164-0x0000000002980000-0x0000000002990000-memory.dmp
      Filesize

      64KB

    • memory/2764-163-0x0000000002980000-0x0000000002990000-memory.dmp
      Filesize

      64KB

    • memory/2764-143-0x0000000007B70000-0x0000000007CEB000-memory.dmp
      Filesize

      1.5MB

    • memory/2764-162-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/2764-154-0x00000000009D0000-0x00000000009E0000-memory.dmp
      Filesize

      64KB

    • memory/2764-161-0x0000000002450000-0x0000000002460000-memory.dmp
      Filesize

      64KB

    • memory/2764-155-0x0000000002450000-0x0000000002460000-memory.dmp
      Filesize

      64KB

    • memory/2764-159-0x0000000002450000-0x0000000002460000-memory.dmp
      Filesize

      64KB

    • memory/2764-158-0x00000000009D0000-0x00000000009E0000-memory.dmp
      Filesize

      64KB

    • memory/2764-150-0x0000000007F60000-0x00000000080B8000-memory.dmp
      Filesize

      1.3MB

    • memory/2764-156-0x0000000002450000-0x0000000002460000-memory.dmp
      Filesize

      64KB

    • memory/2764-152-0x0000000007F60000-0x00000000080B8000-memory.dmp
      Filesize

      1.3MB

    • memory/2764-153-0x00000000024A0000-0x00000000024B0000-memory.dmp
      Filesize

      64KB

    • memory/3168-145-0x0000000000000000-mapping.dmp
    • memory/4584-132-0x0000000000CC0000-0x0000000000D54000-memory.dmp
      Filesize

      592KB

    • memory/4584-136-0x0000000009330000-0x00000000093CC000-memory.dmp
      Filesize

      624KB

    • memory/4584-133-0x0000000005C80000-0x0000000006224000-memory.dmp
      Filesize

      5.6MB

    • memory/4584-134-0x0000000005770000-0x0000000005802000-memory.dmp
      Filesize

      584KB

    • memory/4584-135-0x0000000005710000-0x000000000571A000-memory.dmp
      Filesize

      40KB

    • memory/4780-151-0x0000000000E00000-0x0000000000E2F000-memory.dmp
      Filesize

      188KB

    • memory/4780-149-0x0000000002C00000-0x0000000002C93000-memory.dmp
      Filesize

      588KB

    • memory/4780-148-0x0000000002D30000-0x000000000307A000-memory.dmp
      Filesize

      3.3MB

    • memory/4780-146-0x0000000000E80000-0x0000000000E96000-memory.dmp
      Filesize

      88KB

    • memory/4780-147-0x0000000000E00000-0x0000000000E2F000-memory.dmp
      Filesize

      188KB

    • memory/4780-144-0x0000000000000000-mapping.dmp