Analysis

  • max time kernel
    149s
  • max time network
    144s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16-03-2023 16:24

General

  • Target

    ödeme formu_0001.exe

  • Size

    263KB

  • MD5

    6ba6a3976c46e385615ede0c7584aee3

  • SHA1

    0e9a3ee2ac21bda49a03da78a914a01a7b8f9db6

  • SHA256

    ffc7eef1092b78448529aa79724d73c5babc66fbc440d767b0c46d9037b40ba0

  • SHA512

    6b118a1188fe5300c00009d81a4cf399d32dac43bafae4da76bbecefd4c8ee8a601f7504220621931ff06a398e9680eef11414ec15487d7cca93562861af2445

  • SSDEEP

    6144:vYa6j7KXS9WnHtBBNelQNnxOf2JKeG71gOMTu8mAjJDrmQDF7:vYxGXSaBBNelInxc2JnG71aqE1rmQD1

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

k04s

Decoy

draanabellrojas.com

in03.one

kyraloves.co.uk

laluma.store

londoncell.com

kanurikibueadvocates.com

buyeasynow.net

escapefromtarkov-wiki.com

crewint.net

f-b.boats

beautyaidstudio.com

ashfieldconsultancy.uk

dlogsadood.com

ftgam.xyz

constantinopanama.com

yellowpocket.africa

konyil.com

easomobility.com

1135wickloecourt.com

indexb2b.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3156
    • C:\Users\Admin\AppData\Local\Temp\ödeme formu_0001.exe
      "C:\Users\Admin\AppData\Local\Temp\ödeme formu_0001.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2152
      • C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe
        "C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe" C:\Users\Admin\AppData\Local\Temp\gtwrbuyyg.xip
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4984
        • C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe
          "C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1432
    • C:\Windows\SysWOW64\systray.exe
      "C:\Windows\SysWOW64\systray.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4432
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe"
        3⤵
          PID:3568

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\gtwrbuyyg.xip

      Filesize

      5KB

      MD5

      0813ed75518e67df284ad4e4e91434ce

      SHA1

      4f889413cf20be208839053bfff053fe749f83a2

      SHA256

      a4c0f9bba801f76d558fd5f82b38179f3ab0fae2b58925be281e3f10b8b30b7f

      SHA512

      ca1749d7189c95056e43b040963e2a48690188a864eb32e46843cf6b1ba27712bd8b43cd3cfe5203c5627574e4e14472001193c604835b40526f511298fb5d9a

    • C:\Users\Admin\AppData\Local\Temp\ozziexwbmo.dm

      Filesize

      205KB

      MD5

      0f51246845c3c5b63a9cd5f31badc627

      SHA1

      bbe0099d1dcf7796e6fecf53413c6bef5b0806ea

      SHA256

      546e9ca6e31ddf882eb6a063cea726f159534102a5034e69132c1802cd03b834

      SHA512

      34d686efc7d3e8c7d270ff933b62f4fe9264432f5959ee173f415eb089cf2dcef16fe32f8042d37ad9485a5c9e84271c075c9373256cde40c38da1c447854069

    • C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe

      Filesize

      58KB

      MD5

      e4ae88982876edee96f117b54badc4c0

      SHA1

      4876544d9d0ff63c537b4b431f9f825ffa718f34

      SHA256

      3096af239282f87aca518d9ec511c8cb84c745ee91d24609d708e304770b1183

      SHA512

      dc882604ab330ebb6c38314504e20cac95e66ba05311b44ab62f09472793a16861f679152aef946e29454026c9a3b18a73ece9174467d1910d09ec51f907577a

    • C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe

      Filesize

      58KB

      MD5

      e4ae88982876edee96f117b54badc4c0

      SHA1

      4876544d9d0ff63c537b4b431f9f825ffa718f34

      SHA256

      3096af239282f87aca518d9ec511c8cb84c745ee91d24609d708e304770b1183

      SHA512

      dc882604ab330ebb6c38314504e20cac95e66ba05311b44ab62f09472793a16861f679152aef946e29454026c9a3b18a73ece9174467d1910d09ec51f907577a

    • C:\Users\Admin\AppData\Local\Temp\zyayautyb.exe

      Filesize

      58KB

      MD5

      e4ae88982876edee96f117b54badc4c0

      SHA1

      4876544d9d0ff63c537b4b431f9f825ffa718f34

      SHA256

      3096af239282f87aca518d9ec511c8cb84c745ee91d24609d708e304770b1183

      SHA512

      dc882604ab330ebb6c38314504e20cac95e66ba05311b44ab62f09472793a16861f679152aef946e29454026c9a3b18a73ece9174467d1910d09ec51f907577a

    • memory/1432-149-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1432-142-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1432-145-0x00000000011B0000-0x00000000014FA000-memory.dmp

      Filesize

      3.3MB

    • memory/1432-147-0x0000000001050000-0x0000000001064000-memory.dmp

      Filesize

      80KB

    • memory/3156-148-0x00000000027C0000-0x0000000002933000-memory.dmp

      Filesize

      1.4MB

    • memory/3156-157-0x0000000008340000-0x0000000008487000-memory.dmp

      Filesize

      1.3MB

    • memory/3156-158-0x0000000008340000-0x0000000008487000-memory.dmp

      Filesize

      1.3MB

    • memory/3156-160-0x0000000008340000-0x0000000008487000-memory.dmp

      Filesize

      1.3MB

    • memory/4432-150-0x00000000001C0000-0x00000000001C6000-memory.dmp

      Filesize

      24KB

    • memory/4432-151-0x00000000001C0000-0x00000000001C6000-memory.dmp

      Filesize

      24KB

    • memory/4432-152-0x0000000000350000-0x000000000037F000-memory.dmp

      Filesize

      188KB

    • memory/4432-153-0x00000000023E0000-0x000000000272A000-memory.dmp

      Filesize

      3.3MB

    • memory/4432-154-0x0000000000350000-0x000000000037F000-memory.dmp

      Filesize

      188KB

    • memory/4432-156-0x00000000022D0000-0x0000000002363000-memory.dmp

      Filesize

      588KB