Analysis

  • max time kernel
    150s
  • max time network
    132s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    28-03-2023 07:02

General

  • Target

    542ef4a811e2fa45e96efe1602acd737.exe

  • Size

    301KB

  • MD5

    542ef4a811e2fa45e96efe1602acd737

  • SHA1

    116ae7e038b75fcee7ac7ddc33f96f981c0e81a7

  • SHA256

    f3b8435e7359411cefb4d6c762550f4881195a2ec0cb035da5737c4b4891fb6f

  • SHA512

    5fa0fd179e7fe6157aed9766281d74dedbef4ce52b287634550f3b11bd29ff08081fbc3590bd435ff6846d4018c84d2a76aa2010b220023654b873c46a6c566c

  • SSDEEP

    6144:TYa6RWpn++a1jQdqOgTSZ6i7vJYnmb7qEPDRtmfGe8C9jxIihLY2XJg:TYDWp++UEEOgmZ6uJwmb7q0DRtmfoC9s

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sa79

Decoy

aidigify.com

angelavamundson.xyz

glicotoday.fun

agencyforbuyers.com

blacklifecoachquiz.com

4e6aqw.site

huawei1990.com

diyetcay.online

chesirechefs.co.uk

generalhospitaleu.africa

hfewha.xyz

lemons2cents.com

rahilprakash.com

kave.tech

netlexfrance.net

youthexsa.africa

car-covers-40809.com

bambooactive.store

fotobugil48.com

kuhler.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1264
    • C:\Users\Admin\AppData\Local\Temp\542ef4a811e2fa45e96efe1602acd737.exe
      "C:\Users\Admin\AppData\Local\Temp\542ef4a811e2fa45e96efe1602acd737.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\omrjw.exe
        "C:\Users\Admin\AppData\Local\Temp\omrjw.exe" C:\Users\Admin\AppData\Local\Temp\lnbvfzmz.kjd
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2004
        • C:\Users\Admin\AppData\Local\Temp\omrjw.exe
          "C:\Users\Admin\AppData\Local\Temp\omrjw.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:676
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\omrjw.exe"
        3⤵
          PID:1744

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\lnbvfzmz.kjd
      Filesize

      5KB

      MD5

      6708008ed1049596aea130d698b95b72

      SHA1

      cd85c88ca9bcdf443b2618e58602bc5da2ab2606

      SHA256

      2c8cab39aba9cb704c658e1f2174319e645f1249b8bd4b996569daba4b877cdd

      SHA512

      cb506c5bf424465937a836996a35bf3a2625f3de6f7b9ab1a76b8f9245f387a5a6866eca009345782c1e96adb1c1610c73ae179feac11f409fe5bd1eea12e485

    • C:\Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • C:\Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • C:\Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • C:\Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • C:\Users\Admin\AppData\Local\Temp\pczmt.s
      Filesize

      205KB

      MD5

      4dd6535840793a7f5b71ee849a03b850

      SHA1

      ef2e3c0890ecec630cf8d544be1715e4c3c0fd90

      SHA256

      95703b208c0c156d13995204ecb4180cddc134345cc2ebfed722d2480fa07122

      SHA512

      3c31b4161c5ea16888d944311525fbf04acd55440bfcf6be62d2c882ad297bd90e64ea5b7f2e930c13a42ce9e2993128ac595bf947f9ef67969931754c8570f3

    • \Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • \Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • \Users\Admin\AppData\Local\Temp\omrjw.exe
      Filesize

      159KB

      MD5

      5ae8e4fca84468df1846f5a3a2fbf24f

      SHA1

      1a4ef0d31bd8586986b8c99e69755a55bb9d20b5

      SHA256

      40c5f58f008ac0a8afda1b37bc1c6fa4a8f7e748d957bc54a9195d06bcaf8611

      SHA512

      3328b0a8b3b92f807e4f6aa4c59bf0f97c9aecbfdd4a66555fa3d1ea1e0bb49128dee76ec97c44b192b301716a0f2ce9f5d258ba25bfbdec5619ccea6e07c8f2

    • memory/676-74-0x00000000002B0000-0x00000000002C4000-memory.dmp
      Filesize

      80KB

    • memory/676-76-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/676-73-0x0000000000990000-0x0000000000C93000-memory.dmp
      Filesize

      3.0MB

    • memory/676-68-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1264-75-0x0000000004CC0000-0x0000000004DFC000-memory.dmp
      Filesize

      1.2MB

    • memory/1264-72-0x00000000037F0000-0x00000000038F0000-memory.dmp
      Filesize

      1024KB

    • memory/1264-86-0x0000000004E80000-0x0000000004F62000-memory.dmp
      Filesize

      904KB

    • memory/1264-87-0x0000000004E80000-0x0000000004F62000-memory.dmp
      Filesize

      904KB

    • memory/1264-89-0x0000000004E80000-0x0000000004F62000-memory.dmp
      Filesize

      904KB

    • memory/1704-77-0x0000000000880000-0x000000000089F000-memory.dmp
      Filesize

      124KB

    • memory/1704-79-0x0000000000880000-0x000000000089F000-memory.dmp
      Filesize

      124KB

    • memory/1704-80-0x0000000000080000-0x00000000000AF000-memory.dmp
      Filesize

      188KB

    • memory/1704-81-0x0000000001F70000-0x0000000002273000-memory.dmp
      Filesize

      3.0MB

    • memory/1704-82-0x0000000000080000-0x00000000000AF000-memory.dmp
      Filesize

      188KB

    • memory/1704-85-0x0000000001D40000-0x0000000001DD3000-memory.dmp
      Filesize

      588KB