Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28-03-2023 13:47

General

  • Target

    ODBIÓR MTCN.exe

  • Size

    341KB

  • MD5

    36795a69031d90410d834ad79b3c43e6

  • SHA1

    2ffcc154f19ece4f42d25f3d37fade1d7312e388

  • SHA256

    0ca1816f2c6bc6bb3e9dc4f32b36211472bf4d737d561e9c0a2d67ad38f474a2

  • SHA512

    f745df8db8ddbbc0658ee29cf420c5d5e8773be3a13fc1f055dc222d2f937f251a99db1477982594edbdc78d0decb8d8c9f5aa1feefbbe67a372979273c52882

  • SSDEEP

    6144:/Ya6OjgM/tPAQTVtnJJgl1wPUOCDpTzt9FD4QbCZv1bfJqy1z2Ek9gqCiGw:/YI0M/JrWiPiTz9UrZZKEMgQGw

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ke03

Decoy

fastartcustom.com

ikanggabus.xyz

aevum.ru

lacarretapps.com

arcaneacquisitions.net

fuulyshop.com

bloodbahis278.com

bullardrvpark.com

cowboy-hostel.xyz

empireoba.com

the-windsor-h.africa

help-desk-td.com

dofirosols.life

efefarmy.buzz

kewwrf.top

autoran.co.uk

moodysanalytics.boo

kulturemarket.com

ffwpu-kenya.com

heykon.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2624
    • C:\Users\Admin\AppData\Local\Temp\ODBIÓR MTCN.exe
      "C:\Users\Admin\AppData\Local\Temp\ODBIÓR MTCN.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3596
      • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
        "C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe" C:\Users\Admin\AppData\Local\Temp\kfuudl.f
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4112
        • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
          "C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1568
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1812
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe"
        3⤵
          PID:3996

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bcnzhwlpvgh.qkf
      Filesize

      205KB

      MD5

      5e361407f1974a23969e446d824e15bc

      SHA1

      5985fbe0ec7e2e227aa256d4c0fe4e243425fbe8

      SHA256

      fe8e5c558a357946bfd2786f73b2d5e387f9dba883b93cc237f6354c2d113646

      SHA512

      844ddb346bfc7c9b0dd85494d5833adcaf1fb4f796616b30b70b337c950f5e48f57dc2498804e0fe3cba6822669338727f9d5987e13c85b91f387f96d3d4e3ea

    • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
      Filesize

      254KB

      MD5

      c6c4f3fd9a09db598811b5ebd5c0b3c3

      SHA1

      236f077cecbfae99952fbd5244afd2c14d867f52

      SHA256

      b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

      SHA512

      419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

    • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
      Filesize

      254KB

      MD5

      c6c4f3fd9a09db598811b5ebd5c0b3c3

      SHA1

      236f077cecbfae99952fbd5244afd2c14d867f52

      SHA256

      b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

      SHA512

      419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

    • C:\Users\Admin\AppData\Local\Temp\ebntjcbqhm.exe
      Filesize

      254KB

      MD5

      c6c4f3fd9a09db598811b5ebd5c0b3c3

      SHA1

      236f077cecbfae99952fbd5244afd2c14d867f52

      SHA256

      b108763f9ea5eeaca59513676fd75ab96d4b0a88be9aceaab661dc60a0d780ac

      SHA512

      419b7c2e90273b81d23a010437770d08cc4bfe2ed2e47f6aec44f3cddd6a77f89c2855f05a2a140100a0b5fc60319769445864894f872c6b757be4730b3b26a6

    • C:\Users\Admin\AppData\Local\Temp\kfuudl.f
      Filesize

      6KB

      MD5

      e322847a016b5379761d3bd0eb0c27b2

      SHA1

      56ac2ea7a3edea834d7cd23b01e3e525acf2f09a

      SHA256

      e8fdeb01f368b6bd8939997212f4c5a6c35c69b1223e16c5180c549984216f62

      SHA512

      69a921355713ba3f6e7c440646e0d1be42d0e5882647703afdaa3a8c083795201524d7856126542a4bc6419458a4b6f053f34077a9c081abdd40cd2f9909ba32

    • memory/1568-142-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1568-146-0x0000000000B20000-0x0000000000E6A000-memory.dmp
      Filesize

      3.3MB

    • memory/1568-147-0x0000000000400000-0x000000000042F000-memory.dmp
      Filesize

      188KB

    • memory/1568-148-0x00000000009E0000-0x00000000009F4000-memory.dmp
      Filesize

      80KB

    • memory/1812-150-0x0000000001440000-0x000000000145E000-memory.dmp
      Filesize

      120KB

    • memory/1812-154-0x0000000001440000-0x000000000145E000-memory.dmp
      Filesize

      120KB

    • memory/1812-155-0x0000000000BB0000-0x0000000000BDF000-memory.dmp
      Filesize

      188KB

    • memory/1812-156-0x00000000017D0000-0x0000000001B1A000-memory.dmp
      Filesize

      3.3MB

    • memory/1812-157-0x0000000000BB0000-0x0000000000BDF000-memory.dmp
      Filesize

      188KB

    • memory/1812-159-0x0000000001600000-0x0000000001693000-memory.dmp
      Filesize

      588KB

    • memory/2624-149-0x00000000080B0000-0x00000000081EE000-memory.dmp
      Filesize

      1.2MB

    • memory/2624-160-0x0000000002990000-0x0000000002A3E000-memory.dmp
      Filesize

      696KB

    • memory/2624-161-0x0000000002990000-0x0000000002A3E000-memory.dmp
      Filesize

      696KB

    • memory/2624-163-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-164-0x0000000002A40000-0x0000000002A50000-memory.dmp
      Filesize

      64KB

    • memory/2624-165-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-166-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-167-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-168-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-169-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-170-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-171-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-172-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-173-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-174-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-175-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-176-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-177-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-178-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-179-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-180-0x0000000002A40000-0x0000000002A50000-memory.dmp
      Filesize

      64KB

    • memory/2624-181-0x0000000002990000-0x0000000002A3E000-memory.dmp
      Filesize

      696KB

    • memory/2624-188-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-189-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-190-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-191-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-192-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-193-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-194-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-196-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-195-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-197-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-198-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-199-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-200-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-201-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-202-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-203-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-204-0x0000000002A50000-0x0000000002A52000-memory.dmp
      Filesize

      8KB

    • memory/2624-211-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-212-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-213-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-214-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-215-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-216-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-217-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-219-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-218-0x00000000026E0000-0x00000000026F0000-memory.dmp
      Filesize

      64KB

    • memory/2624-227-0x00000000025E0000-0x00000000025E2000-memory.dmp
      Filesize

      8KB

    • memory/2624-228-0x0000000000690000-0x0000000000699000-memory.dmp
      Filesize

      36KB

    • memory/4112-140-0x00000000006E0000-0x00000000006E2000-memory.dmp
      Filesize

      8KB