Analysis

  • max time kernel
    150s
  • max time network
    149s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20221111-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/02/2023, 15:06

General

  • Target

    dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b.exe

  • Size

    292KB

  • MD5

    500ce28cca98df7f3d40fa8f5e428598

  • SHA1

    83a021883ab8c45b04488074ad5f196dd5bc0de5

  • SHA256

    dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b

  • SHA512

    0a0d6267baad1b5ceec3bd6f8af771456442ea08c3750a0f811dd6bf8281fd66de3e8bdb87a5933dd455af2ab68a795c94a5e0c75e2b6f2b01fd3be207b851b7

  • SSDEEP

    6144:vYa67vB1oNb15mb3SfCt/CE76CQ1vGNJxtkxKKSZvyvB9dSuMwviPnMx5I:vYBvB1Wp8b307NruJnkxqWj4uMVPn/

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b07o

Decoy

rpalmerdecorating.co.uk

magellanalytics.net

28yorkave.com

woodburnershop.co.uk

jcw-media.com

helinica.com

yuaneju.com

akypan.top

cavidahome.com

annaswiatkowski.com

123findcapital.com

danielle.nyc

dhcons.click

ocnarf.co.uk

1wowoc.top

corbett.one

extersolutions.com

fcukart.com

fadaona.online

guangness.top

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1048
    • C:\Users\Admin\AppData\Local\Temp\dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b.exe
      "C:\Users\Admin\AppData\Local\Temp\dc2766f4f8bd2b9b0a2b8fb18426735755ba12ac8e080be1107363305f4c5f5b.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe
        "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe" C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1984
        • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe
          "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:4120
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4308
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe"
        3⤵
          PID:4912

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

            Filesize

            139KB

            MD5

            39e740ff4e6fb6f21830aedff351d66a

            SHA1

            24211bcc5a5caaa5f5fccaa145017cf1266b7e29

            SHA256

            670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

            SHA512

            89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

          • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

            Filesize

            139KB

            MD5

            39e740ff4e6fb6f21830aedff351d66a

            SHA1

            24211bcc5a5caaa5f5fccaa145017cf1266b7e29

            SHA256

            670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

            SHA512

            89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

          • C:\Users\Admin\AppData\Local\Temp\fmgwqo.exe

            Filesize

            139KB

            MD5

            39e740ff4e6fb6f21830aedff351d66a

            SHA1

            24211bcc5a5caaa5f5fccaa145017cf1266b7e29

            SHA256

            670004235984a334c84cc8f7a08f274530799a0b56c360e5bd9b6e5a34361a37

            SHA512

            89489311827744632af3fb6998344dcc974b138cd33c5a6b9a0b81e4d27bd1f6a4953095d333ac60ff38e9c8d7b1498aa3aa883553fef0f3f59232e5bc54559e

          • C:\Users\Admin\AppData\Local\Temp\lglfpuxh.i

            Filesize

            5KB

            MD5

            b6ff144e77e74f6cdea0365ee31214e7

            SHA1

            50efae8cc2ff6cddf822bd9f330e486cd4252ca8

            SHA256

            614bbeeede1a2ec9afd7ab98e38ed80f807d7b64214c0ab52b900fb055202ce6

            SHA512

            b7303e9e911dbe26f1efe5308b6e537bdfe93427ba4c3494ffdbb7ae1d1779e01ba3386eba13eac7f724e4510e107a619a0977b90514264d99c7de4230402c39

          • C:\Users\Admin\AppData\Local\Temp\slfnfzw.gd

            Filesize

            205KB

            MD5

            3cde900bd825c044f5c2690334fa0f1f

            SHA1

            e0c1a63300eb6cc94940a5eea200b0af8a82c6e5

            SHA256

            f69c5f49d387c16b28ea47a859f83327080d7415cf46354004ac7c6f4976bebe

            SHA512

            28af4f4cde12e2e0d6340a1cb52aa4a1824be05c0549cfe409b0b5ee56233d7a134536650f98475573185679f5aa6dd792ff6f012a1d70a0ca9d4d416324ae61

          • memory/1048-178-0x0000000008100000-0x0000000008110000-memory.dmp

            Filesize

            64KB

          • memory/1048-198-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-224-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-223-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-222-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-221-0x0000000002A00000-0x0000000002A10000-memory.dmp

            Filesize

            64KB

          • memory/1048-220-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-219-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-218-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-181-0x0000000002A00000-0x0000000002A10000-memory.dmp

            Filesize

            64KB

          • memory/1048-216-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-215-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-214-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-213-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-212-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-211-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-153-0x0000000008220000-0x0000000008334000-memory.dmp

            Filesize

            1.1MB

          • memory/1048-154-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-155-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-156-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-157-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-158-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-159-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-160-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-179-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-162-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-163-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-164-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-165-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-166-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-167-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-168-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-169-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-170-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-171-0x0000000007520000-0x0000000007530000-memory.dmp

            Filesize

            64KB

          • memory/1048-172-0x0000000008100000-0x0000000008110000-memory.dmp

            Filesize

            64KB

          • memory/1048-173-0x0000000008100000-0x0000000008110000-memory.dmp

            Filesize

            64KB

          • memory/1048-174-0x0000000008100000-0x0000000008110000-memory.dmp

            Filesize

            64KB

          • memory/1048-175-0x0000000008220000-0x0000000008334000-memory.dmp

            Filesize

            1.1MB

          • memory/1048-176-0x0000000008100000-0x0000000008110000-memory.dmp

            Filesize

            64KB

          • memory/1048-177-0x0000000008100000-0x0000000008110000-memory.dmp

            Filesize

            64KB

          • memory/1048-142-0x0000000002A60000-0x0000000002B56000-memory.dmp

            Filesize

            984KB

          • memory/1048-161-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-144-0x0000000002E00000-0x0000000002EF4000-memory.dmp

            Filesize

            976KB

          • memory/1048-217-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-182-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-183-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-184-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-185-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-186-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-187-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-188-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-189-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-190-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-191-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-192-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-193-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-194-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-195-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-196-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-197-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-180-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-199-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-200-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-201-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-202-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-203-0x0000000007CC0000-0x0000000007CD0000-memory.dmp

            Filesize

            64KB

          • memory/1048-204-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-205-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-206-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-207-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-208-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-209-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/1048-210-0x0000000002BE0000-0x0000000002BF0000-memory.dmp

            Filesize

            64KB

          • memory/4120-143-0x00000000015E0000-0x00000000015F4000-memory.dmp

            Filesize

            80KB

          • memory/4120-146-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4120-139-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4120-140-0x0000000001670000-0x00000000019BA000-memory.dmp

            Filesize

            3.3MB

          • memory/4120-141-0x0000000001360000-0x0000000001374000-memory.dmp

            Filesize

            80KB

          • memory/4308-149-0x0000000000AE0000-0x0000000000B0F000-memory.dmp

            Filesize

            188KB

          • memory/4308-152-0x0000000000AE0000-0x0000000000B0F000-memory.dmp

            Filesize

            188KB

          • memory/4308-148-0x0000000000190000-0x00000000001E7000-memory.dmp

            Filesize

            348KB

          • memory/4308-150-0x0000000002B80000-0x0000000002ECA000-memory.dmp

            Filesize

            3.3MB

          • memory/4308-151-0x00000000028F0000-0x0000000002983000-memory.dmp

            Filesize

            588KB