Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    14/04/2023, 17:58

General

  • Target

    New order list_pdf.exe

  • Size

    260KB

  • MD5

    9db995a644af18837b503d2d9a33bdec

  • SHA1

    c06cd0c6e3cdfbbe49f85765335ce9eff4500edd

  • SHA256

    dd4311e439da8393afbb51dc192317d6cd5a53b9d574971adb768c38a2bf3d71

  • SHA512

    5c857e420be06475c1ef7ae2294f90b6eac5da0c78bcc15aa0a2284a5ab184711b6a72bfdf06fbfcb5afcebbc105466493373a208a76be8000d76777ad318fa0

  • SSDEEP

    6144:/Ya6LZk8ky9q604SngQ2SLljDavgmtLGdBdMW4Tem7lZfhS:/YJZ726fSgQ2SLcvRtw85lFg

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hs95

Decoy

capitalpartnersintl.com

learnotctrading.africa

kokotripbali.click

laserelitecreations.com

55522.voto

hezop.xyz

6n992.com

aelh3s.shop

victmcomssioner.org.uk

7xwithlove.com

gregdf.click

thewarehouseconsultants.africa

ilbufalaro.online

bulkcheapstamps.com

etismc.top

beautyby-eve.com

dabopixel.com

freddybrowne-17.com

heat-pumps-11472.com

cleaningbyeve.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:3144
    • C:\Users\Admin\AppData\Local\Temp\New order list_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\New order list_pdf.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1960
      • C:\Users\Admin\AppData\Local\Temp\otvme.exe
        "C:\Users\Admin\AppData\Local\Temp\otvme.exe" C:\Users\Admin\AppData\Local\Temp\irayhlq.rxs
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3744
        • C:\Users\Admin\AppData\Local\Temp\otvme.exe
          "C:\Users\Admin\AppData\Local\Temp\otvme.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2804
    • C:\Windows\SysWOW64\ipconfig.exe
      "C:\Windows\SysWOW64\ipconfig.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3296
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\otvme.exe"
        3⤵
          PID:4492

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\irayhlq.rxs

            Filesize

            6KB

            MD5

            0a78b16f782ae1d6b77a0ad2ef477189

            SHA1

            b3ea8bc878553722253f13270ab5835e53ffe807

            SHA256

            22519b6efe6c76c449ae52af794e6f60190d0727b7c21aa332c8cf01b5c10dd2

            SHA512

            b7d3bef545f59ea6b8dcc21d4aad484d8476d5d8d4f278f9a9c75c9b2bf366445a20cb83ff74b0cbcf4d55b1c67e3080f9e5a618ff67550034a9595336ccd2f8

          • C:\Users\Admin\AppData\Local\Temp\moducnulp.ytt

            Filesize

            205KB

            MD5

            989d53616919dbe2defed3f2d35d570a

            SHA1

            21fec5cefaaba32b80884cd5809766821fc12ba9

            SHA256

            fbcca8d8452467f436b694e64525657e24cdcd27138f5797789d7c6ea2290555

            SHA512

            630c84d15a4db084d1d30958a2bed6c360ace9a4768a2dbe34684ae5fa42604d2787986a26ed1b8df4a4ce0e7766f46d9441fc67af2907328c7a9f8befbd26de

          • C:\Users\Admin\AppData\Local\Temp\otvme.exe

            Filesize

            53KB

            MD5

            ea0232bab33c6cd61b7eee5de64f895a

            SHA1

            64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

            SHA256

            0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

            SHA512

            b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

          • C:\Users\Admin\AppData\Local\Temp\otvme.exe

            Filesize

            53KB

            MD5

            ea0232bab33c6cd61b7eee5de64f895a

            SHA1

            64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

            SHA256

            0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

            SHA512

            b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

          • C:\Users\Admin\AppData\Local\Temp\otvme.exe

            Filesize

            53KB

            MD5

            ea0232bab33c6cd61b7eee5de64f895a

            SHA1

            64b37d8d075f4c72d0aa387bde54ca7f74ffb0b0

            SHA256

            0376d844537ef146ff53eb758b9eb89cfcd3b21eca355d54f96d93ec98318704

            SHA512

            b6b8643521b5f8e431da1c1240ded7b6af36b9931348aa2cb14b8f41a2a0cae7f5ebb1a522095071ed1f8a919e11582423116366d411a6d59b11867a9deb2018

          • memory/2804-147-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2804-142-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2804-146-0x00000000009B0000-0x0000000000CFA000-memory.dmp

            Filesize

            3.3MB

          • memory/2804-148-0x00000000006D0000-0x00000000006E5000-memory.dmp

            Filesize

            84KB

          • memory/3144-149-0x0000000008AA0000-0x0000000008B52000-memory.dmp

            Filesize

            712KB

          • memory/3144-159-0x00000000079F0000-0x0000000007ABD000-memory.dmp

            Filesize

            820KB

          • memory/3144-160-0x00000000079F0000-0x0000000007ABD000-memory.dmp

            Filesize

            820KB

          • memory/3144-162-0x00000000079F0000-0x0000000007ABD000-memory.dmp

            Filesize

            820KB

          • memory/3296-151-0x00000000007B0000-0x00000000007BB000-memory.dmp

            Filesize

            44KB

          • memory/3296-153-0x00000000007B0000-0x00000000007BB000-memory.dmp

            Filesize

            44KB

          • memory/3296-154-0x0000000000110000-0x000000000013F000-memory.dmp

            Filesize

            188KB

          • memory/3296-155-0x0000000000C80000-0x0000000000FCA000-memory.dmp

            Filesize

            3.3MB

          • memory/3296-156-0x0000000000110000-0x000000000013F000-memory.dmp

            Filesize

            188KB

          • memory/3296-158-0x0000000000920000-0x00000000009B4000-memory.dmp

            Filesize

            592KB

          • memory/3744-140-0x00000000005C0000-0x00000000005C2000-memory.dmp

            Filesize

            8KB