Analysis

  • max time kernel
    148s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10-03-2023 06:42

General

  • Target

    3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js

  • Size

    341KB

  • MD5

    59b4d0fb62bea58db86b5f9b82382f21

  • SHA1

    57bae158e509b8e23c3347efeaf00553920b8bf6

  • SHA256

    3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871

  • SHA512

    d09975b8ecf9de689bf7e9cebfa9430940b6f465e00a15b4baeb839c598c61cac380263db96f027ef4328b705a773c3a4543961ba1806cc31c86a2fd82f29e6e

  • SSDEEP

    6144:D9w3fOYrR6SInG2u3Wp4cwRDyTlMiAaJ/jpPiWUiSFtroVSSM1tZQfm:YWaR6SInGj3WN6DyhMiASjpPhSFtroVI

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

a24e

Decoy

flormarine.co.uk

theglazingsquad.uk

konarkpharma.com

maxpropertyfinanceuk.co.uk

jackson-ifc.com

yvonneazevedoimoveis.net

baystella.com

arexbaba.online

trihgd.xyz

filth520571.com

cikpkg.cfd

jakesupport.com

8863365.com

duniaslot777.online

lop3a.com

berkut-clan.ru

lernnavigator.com

elenaisaprincess.co.uk

daimadaquan.xyz

mychirocart.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Formbook payload 5 IoCs
  • Blocklisted process makes network request 16 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Drops startup file 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 20 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Windows\system32\wscript.exe
    wscript.exe C:\Users\Admin\AppData\Local\Temp\3580ae39b6b33aa67838c5c1ca91b6aebf91e470360fb13072497e85df748871.js
    1⤵
    • Checks computer location settings
    • Suspicious use of WriteProcessMemory
    PID:4108
    • C:\Windows\System32\wscript.exe
      "C:\Windows\System32\wscript.exe" //B "C:\Users\Admin\AppData\Roaming\SfehVeXIsQ.js"
      2⤵
      • Blocklisted process makes network request
      • Drops startup file
      PID:3712
    • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe
      "C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:1056
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3184
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2068
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe"
        3⤵
          PID:4316

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe

      Filesize

      185KB

      MD5

      a20ea9350fa5aa4d9641723f3dfc1b31

      SHA1

      c23cf2953ea071eac81740a687473442c66e73de

      SHA256

      01afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae

      SHA512

      296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035

    • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe

      Filesize

      185KB

      MD5

      a20ea9350fa5aa4d9641723f3dfc1b31

      SHA1

      c23cf2953ea071eac81740a687473442c66e73de

      SHA256

      01afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae

      SHA512

      296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035

    • C:\Users\Admin\AppData\Local\Temp\BIG BRO.exe

      Filesize

      185KB

      MD5

      a20ea9350fa5aa4d9641723f3dfc1b31

      SHA1

      c23cf2953ea071eac81740a687473442c66e73de

      SHA256

      01afe1517575e1fd7f60e86702fc11a97cfc74718e520c6016eef42fa164b4ae

      SHA512

      296b4ace0af1f33abb8c3c0262999b07c8ad6e9a4c075959b43335992f1058865581b2c7d362dc824ed787f61dc9c62338778cd28e12add2ac34b086ca62e035

    • C:\Users\Admin\AppData\Roaming\SfehVeXIsQ.js

      Filesize

      5KB

      MD5

      ef7a0bcfc54e28b9a81af747b834c898

      SHA1

      47f605a45958a0beab476be0ef3b97434f7b999e

      SHA256

      24fc05651edf06401a27a583f1dbe295881a16f9f98a04321319f3873a8569a4

      SHA512

      c975ac3784e346a0ed4f754177f25d256b41bd0bf707f37f0e04e3d15022db5e6d9bfbe50719b8ac483f9b7406a0a3a2782a28f279a046f61faffb863ec5da31

    • memory/1056-144-0x00000000014A0000-0x00000000017EA000-memory.dmp

      Filesize

      3.3MB

    • memory/1056-145-0x0000000001020000-0x0000000001034000-memory.dmp

      Filesize

      80KB

    • memory/2068-147-0x0000000000F10000-0x0000000000F37000-memory.dmp

      Filesize

      156KB

    • memory/2068-148-0x0000000000F10000-0x0000000000F37000-memory.dmp

      Filesize

      156KB

    • memory/2068-149-0x0000000001330000-0x000000000135F000-memory.dmp

      Filesize

      188KB

    • memory/2068-150-0x0000000003540000-0x000000000388A000-memory.dmp

      Filesize

      3.3MB

    • memory/2068-151-0x0000000001330000-0x000000000135F000-memory.dmp

      Filesize

      188KB

    • memory/2068-153-0x0000000003380000-0x0000000003413000-memory.dmp

      Filesize

      588KB

    • memory/3184-146-0x0000000008280000-0x000000000838F000-memory.dmp

      Filesize

      1.1MB

    • memory/3184-154-0x0000000008810000-0x0000000008976000-memory.dmp

      Filesize

      1.4MB

    • memory/3184-155-0x0000000008810000-0x0000000008976000-memory.dmp

      Filesize

      1.4MB

    • memory/3184-156-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-157-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-158-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-159-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-160-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-161-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-162-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-163-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-164-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-165-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-166-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-167-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-168-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-169-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-170-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-171-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-173-0x0000000008810000-0x0000000008976000-memory.dmp

      Filesize

      1.4MB

    • memory/3184-174-0x0000000008810000-0x0000000008976000-memory.dmp

      Filesize

      1.4MB

    • memory/3184-175-0x0000000008810000-0x0000000008976000-memory.dmp

      Filesize

      1.4MB

    • memory/3184-177-0x0000000008810000-0x0000000008976000-memory.dmp

      Filesize

      1.4MB

    • memory/3184-183-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-184-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-185-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-186-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-187-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-188-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-189-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-190-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-191-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-192-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-193-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-194-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-195-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-196-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-197-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-198-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-199-0x0000000007870000-0x0000000007872000-memory.dmp

      Filesize

      8KB

    • memory/3184-206-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-207-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-208-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-209-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-210-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-211-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-212-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-214-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-213-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-215-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-216-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-217-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-218-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-219-0x0000000002D80000-0x0000000002D90000-memory.dmp

      Filesize

      64KB

    • memory/3184-222-0x0000000000CA0000-0x0000000000CA2000-memory.dmp

      Filesize

      8KB

    • memory/3184-223-0x0000000000CB0000-0x0000000000CBA000-memory.dmp

      Filesize

      40KB