Analysis

  • max time kernel
    149s
  • max time network
    143s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    27-03-2023 10:03

General

  • Target

    ODBIÓR MTCN.exe

  • Size

    341KB

  • MD5

    36795a69031d90410d834ad79b3c43e6

  • SHA1

    2ffcc154f19ece4f42d25f3d37fade1d7312e388

  • SHA256

    0ca1816f2c6bc6bb3e9dc4f32b36211472bf4d737d561e9c0a2d67ad38f474a2

  • SHA512

    f745df8db8ddbbc0658ee29cf420c5d5e8773be3a13fc1f055dc222d2f937f251a99db1477982594edbdc78d0decb8d8c9f5aa1feefbbe67a372979273c52882

  • SSDEEP

    6144:/Ya6OjgM/tPAQTVtnJJgl1wPUOCDpTzt9FD4QbCZv1bfJqy1z2Ek9gqCiGw:/YI0M/JrWiPiTz9UrZZKEMgQGw

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ke03

Decoy

fastartcustom.com

ikanggabus.xyz

aevum.ru

lacarretapps.com

arcaneacquisitions.net

fuulyshop.com

bloodbahis278.com

bullardrvpark.com

cowboy-hostel.xyz

empireoba.com

the-windsor-h.africa

help-desk-td.com

dofirosols.life

efefarmy.buzz

kewwrf.top

autoran.co.uk

moodysanalytics.boo

kulturemarket.com

ffwpu-kenya.com

heykon.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\ODBIÓR MTCN.exe
      "C:\Users\Admin\AppData\Local\Temp\ODBIÓR MTCN.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        "C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe" C:\Users\Admin\AppData\Local\Temp\kfuudl.f
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:932
        • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
          "C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:1324
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            5⤵
              PID:888
            • C:\Windows\SysWOW64\wlanext.exe
              "C:\Windows\SysWOW64\wlanext.exe"
              5⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:884
              • C:\Windows\SysWOW64\cmd.exe
                /c del "C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe"
                6⤵
                  PID:620

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Discovery

      System Information Discovery

      1
      T1082

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\bcnzhwlpvgh.qkf
        Filesize

        205KB

        MD5

        5e361407f1974a23969e446d824e15bc

        SHA1

        5985fbe0ec7e2e227aa256d4c0fe4e243425fbe8

        SHA256

        fe8e5c558a357946bfd2786f73b2d5e387f9dba883b93cc237f6354c2d113646

        SHA512

        844ddb346bfc7c9b0dd85494d5833adcaf1fb4f796616b30b70b337c950f5e48f57dc2498804e0fe3cba6822669338727f9d5987e13c85b91f387f96d3d4e3ea

      • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • C:\Users\Admin\AppData\Local\Temp\kfuudl.f
        Filesize

        6KB

        MD5

        e322847a016b5379761d3bd0eb0c27b2

        SHA1

        56ac2ea7a3edea834d7cd23b01e3e525acf2f09a

        SHA256

        e8fdeb01f368b6bd8939997212f4c5a6c35c69b1223e16c5180c549984216f62

        SHA512

        69a921355713ba3f6e7c440646e0d1be42d0e5882647703afdaa3a8c083795201524d7856126542a4bc6419458a4b6f053f34077a9c081abdd40cd2f9909ba32

      • \Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • \Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • \Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        Filesize

        254KB

        MD5

        c6c4f3fd9a09db598811b5ebd5c0b3c3

        SHA1

        236f077cecbfae99952fbd5244afd2c14d867f52

        SHA256

        b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

        SHA512

        419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

      • memory/884-85-0x0000000001DD0000-0x00000000020D3000-memory.dmp
        Filesize

        3.0MB

      • memory/884-86-0x00000000000C0000-0x00000000000EF000-memory.dmp
        Filesize

        188KB

      • memory/884-89-0x00000000020E0000-0x0000000002173000-memory.dmp
        Filesize

        588KB

      • memory/884-84-0x00000000000C0000-0x00000000000EF000-memory.dmp
        Filesize

        188KB

      • memory/884-83-0x0000000000820000-0x0000000000836000-memory.dmp
        Filesize

        88KB

      • memory/884-80-0x0000000000820000-0x0000000000836000-memory.dmp
        Filesize

        88KB

      • memory/1248-87-0x0000000000150000-0x0000000000250000-memory.dmp
        Filesize

        1024KB

      • memory/1248-78-0x0000000006C70000-0x0000000006DBB000-memory.dmp
        Filesize

        1.3MB

      • memory/1248-93-0x0000000006FD0000-0x0000000007073000-memory.dmp
        Filesize

        652KB

      • memory/1248-76-0x0000000003920000-0x0000000003A20000-memory.dmp
        Filesize

        1024KB

      • memory/1248-91-0x0000000006FD0000-0x0000000007073000-memory.dmp
        Filesize

        652KB

      • memory/1248-74-0x0000000004F90000-0x00000000050E3000-memory.dmp
        Filesize

        1.3MB

      • memory/1248-90-0x0000000006FD0000-0x0000000007073000-memory.dmp
        Filesize

        652KB

      • memory/1324-68-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1324-72-0x0000000000990000-0x0000000000C93000-memory.dmp
        Filesize

        3.0MB

      • memory/1324-73-0x00000000002B0000-0x00000000002C4000-memory.dmp
        Filesize

        80KB

      • memory/1324-77-0x0000000000300000-0x0000000000314000-memory.dmp
        Filesize

        80KB

      • memory/1324-75-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1324-79-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB