Analysis

  • max time kernel
    150s
  • max time network
    138s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29-03-2023 20:57

General

  • Target

    test.exe

  • Size

    185KB

  • MD5

    c4fb6a54f9d13d0b7d68c344642587d2

  • SHA1

    5d5f8a45e56add2a6ff277f8d5fa06a29ada957a

  • SHA256

    31bca1958a79f4759d45877792d31ce6489a9b12abfd306218cab030f8f86e0b

  • SHA512

    7db73aa24b61d85022c23a924025acd2e2e98d03b00eada01140152ee6acd82754e0a1ed2745c11234679d1b61343e1fa854a06af3841524ab7b797ca9f271ed

  • SSDEEP

    3072:I3k9Eu2PDPlFm3TiZHhJmoapMZRrr9d+/eqeibwnFUMGBY8:zkQTeHlaGZRX9K4XeY8

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ar73

Decoy

classgorilla.com

b6817.com

1wwuwa.top

dgslimited.africa

deepwaterships.com

hkshshoptw.shop

hurricanevalleyatvjamboree.com

ckpconsulting.com

laojiangmath.com

authenticityhacking.com

family-doctor-53205.com

investinstgeorgeut.com

lithoearthsolution.africa

quickhealcareltd.co.uk

delightkgrillw.top

freezeclosettoilet.com

coo1star.com

gemgamut.com

enrichednetworksolutions.com

betterbeeclean.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3140
    • C:\Users\Admin\AppData\Local\Temp\test.exe
      "C:\Users\Admin\AppData\Local\Temp\test.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:4616
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1440
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\test.exe"
        3⤵
          PID:1100

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1440-136-0x0000000000B90000-0x0000000000B9E000-memory.dmp
      Filesize

      56KB

    • memory/1440-138-0x0000000000B90000-0x0000000000B9E000-memory.dmp
      Filesize

      56KB

    • memory/1440-139-0x0000000000B00000-0x0000000000B2F000-memory.dmp
      Filesize

      188KB

    • memory/1440-140-0x0000000001800000-0x0000000001B4A000-memory.dmp
      Filesize

      3.3MB

    • memory/1440-141-0x0000000000B00000-0x0000000000B2F000-memory.dmp
      Filesize

      188KB

    • memory/1440-143-0x00000000016A0000-0x0000000001733000-memory.dmp
      Filesize

      588KB

    • memory/3140-135-0x00000000026B0000-0x00000000027E9000-memory.dmp
      Filesize

      1.2MB

    • memory/3140-144-0x0000000007CB0000-0x0000000007DDE000-memory.dmp
      Filesize

      1.2MB

    • memory/3140-145-0x0000000007CB0000-0x0000000007DDE000-memory.dmp
      Filesize

      1.2MB

    • memory/3140-147-0x0000000007CB0000-0x0000000007DDE000-memory.dmp
      Filesize

      1.2MB

    • memory/4616-134-0x0000000000C70000-0x0000000000C84000-memory.dmp
      Filesize

      80KB

    • memory/4616-133-0x0000000000D20000-0x000000000106A000-memory.dmp
      Filesize

      3.3MB