Analysis

  • max time kernel
    143s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    20-02-2023 12:20

General

  • Target

    new.exe

  • Size

    423KB

  • MD5

    d00138d4097d9e64a13f408bb7441b4f

  • SHA1

    e7d7447a48917bb0090f4d2f80148006f91d8228

  • SHA256

    1954e5d17d12c8b4fabdb74dec7e0001ce7a5143052430155668111e1e4039cf

  • SHA512

    f7a3f7c59888edc4270bb31c65bd6d25d43b16d6835d3638f1693fb0fbbef1f09aa7512f7e41bf455fd96a5cb029d491d8a33b1b727c00793134fda92b933ff4

  • SSDEEP

    6144:jYa6DVGiehYrkn1BvF7f9wINRpJpkSsysPN4SoR/tbr/k63U/sO1i8FlTdI3:jYxVNeug7f9wITdkSsV43dI6E/Hfs

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ho62

Decoy

aqawonky.com

ancachsroadsideassistance.com

artologycreatlive.com

olesinfo.africa

lovebreatheandsleep.com

friendsofdragonsprings.com

homecomingmums.wiki

hg222.bet

precision-spares.co.uk

generalhospitaleu.africa

touchstone4x4.africa

dynamator.com

dental-implants-52531.com

efefear.buzz

bentonapp.net

89luxu.com

bridgesonelm.com

acesaigon.online

instantapprovals.loans

evuniverso.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 3 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\new.exe
      "C:\Users\Admin\AppData\Local\Temp\new.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:976
      • C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe
        "C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe" C:\Users\Admin\AppData\Local\Temp\xjfdjrmdyjo.r
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:1888
        • C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe
          "C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:700

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe
    Filesize

    296KB

    MD5

    e0e1e7aa194ff7f3de17a2eafe5e92eb

    SHA1

    8415a4b78de0eb06a0c715046b63b63c2a785d2d

    SHA256

    edde7e13debc34e655dbc59e42f66644525ac72480f510b708be6a6065e2ce4c

    SHA512

    62228860b22d660aef179b5394d7ce9e01d1b560b80e2f40cfa607bf703e5a52176702977e6da46794c80a16d7fe6dda07fc9a873dad29e6561fcd5e45c4d7b4

  • C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe
    Filesize

    296KB

    MD5

    e0e1e7aa194ff7f3de17a2eafe5e92eb

    SHA1

    8415a4b78de0eb06a0c715046b63b63c2a785d2d

    SHA256

    edde7e13debc34e655dbc59e42f66644525ac72480f510b708be6a6065e2ce4c

    SHA512

    62228860b22d660aef179b5394d7ce9e01d1b560b80e2f40cfa607bf703e5a52176702977e6da46794c80a16d7fe6dda07fc9a873dad29e6561fcd5e45c4d7b4

  • C:\Users\Admin\AppData\Local\Temp\rvcgltry.exe
    Filesize

    296KB

    MD5

    e0e1e7aa194ff7f3de17a2eafe5e92eb

    SHA1

    8415a4b78de0eb06a0c715046b63b63c2a785d2d

    SHA256

    edde7e13debc34e655dbc59e42f66644525ac72480f510b708be6a6065e2ce4c

    SHA512

    62228860b22d660aef179b5394d7ce9e01d1b560b80e2f40cfa607bf703e5a52176702977e6da46794c80a16d7fe6dda07fc9a873dad29e6561fcd5e45c4d7b4

  • C:\Users\Admin\AppData\Local\Temp\tclpuoflals.opy
    Filesize

    205KB

    MD5

    deac0048a0c6ec356070a82ce292fe6f

    SHA1

    537f69f232356d953ce0474032efb7bcd14ef39f

    SHA256

    dafcc435e99f4fd4798fdd740b6379685764037093d83547ffb500f043f1d646

    SHA512

    4e51b1a11c010f5525c6774234f33f7c4076c067bd1cd7921cdc7c204f2032e9939b4c4740f049740ad957e5a8b1f0f1b0ed7b15c6b97f3571c6feed0d31557e

  • C:\Users\Admin\AppData\Local\Temp\xjfdjrmdyjo.r
    Filesize

    6KB

    MD5

    63ea2b1b129b3bdb981a0ab43167e734

    SHA1

    97f8c5869717e0fc9625aa128b0b9f473121bc0b

    SHA256

    db767d3f93786d24e935f5ee35b65ea6038b786cf6e57ade24404de162a0de84

    SHA512

    1f707e603fec74832e55bb57803461c45408ff17bd00222fb17d0bbd5faac2bb0365897e00ebaa18cdd5d84780c1153b87f7f049af8cc35306f6ffda1d878b7e

  • \Users\Admin\AppData\Local\Temp\rvcgltry.exe
    Filesize

    296KB

    MD5

    e0e1e7aa194ff7f3de17a2eafe5e92eb

    SHA1

    8415a4b78de0eb06a0c715046b63b63c2a785d2d

    SHA256

    edde7e13debc34e655dbc59e42f66644525ac72480f510b708be6a6065e2ce4c

    SHA512

    62228860b22d660aef179b5394d7ce9e01d1b560b80e2f40cfa607bf703e5a52176702977e6da46794c80a16d7fe6dda07fc9a873dad29e6561fcd5e45c4d7b4

  • \Users\Admin\AppData\Local\Temp\rvcgltry.exe
    Filesize

    296KB

    MD5

    e0e1e7aa194ff7f3de17a2eafe5e92eb

    SHA1

    8415a4b78de0eb06a0c715046b63b63c2a785d2d

    SHA256

    edde7e13debc34e655dbc59e42f66644525ac72480f510b708be6a6065e2ce4c

    SHA512

    62228860b22d660aef179b5394d7ce9e01d1b560b80e2f40cfa607bf703e5a52176702977e6da46794c80a16d7fe6dda07fc9a873dad29e6561fcd5e45c4d7b4

  • memory/700-63-0x000000000041F070-mapping.dmp
  • memory/700-65-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/700-66-0x00000000008F0000-0x0000000000BF3000-memory.dmp
    Filesize

    3.0MB

  • memory/700-67-0x0000000000350000-0x0000000000365000-memory.dmp
    Filesize

    84KB

  • memory/700-69-0x0000000000390000-0x00000000003A5000-memory.dmp
    Filesize

    84KB

  • memory/700-71-0x0000000000400000-0x000000000042F000-memory.dmp
    Filesize

    188KB

  • memory/976-54-0x0000000075891000-0x0000000075893000-memory.dmp
    Filesize

    8KB

  • memory/1280-68-0x0000000004920000-0x0000000004A7C000-memory.dmp
    Filesize

    1.4MB

  • memory/1280-70-0x0000000004CD0000-0x0000000004E24000-memory.dmp
    Filesize

    1.3MB

  • memory/1888-56-0x0000000000000000-mapping.dmp