Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    03/05/2023, 13:50

General

  • Target

    invoice.exe

  • Size

    727KB

  • MD5

    b0ca2f76a71ba322dab26bfb0eae3977

  • SHA1

    f3e9c81c880ec14019280b6624e1092a65496b5a

  • SHA256

    24380c6d7b340557a8e71c58078bd0ed311e3c42b975a75d23a0056210e2ad3e

  • SHA512

    529eaf4481770e3940a8e3323ba9260485d9bf5a60632b7ecc38522b8ca39f94534ab8f073500839ae03600339830ae435a143b04a7a9ba46786764b2680cc19

  • SSDEEP

    12288:EB6C6YN1PCGEDUuCkaRundIbjl7GlU+1FlQhLdzQEdCcZKW7/e3w:zLcLRunmfFmjnCCcZh7/e3w

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m82

Decoy

jamesdevereux.com

artificialturfminneapolis.com

hongmeiyan.com

lojaderoupasbr.com

yit.africa

austinrelocationexpert.com

saiva.page

exitsategy.com

chochonux.com

klosterbraeu-unterliezheim.com

byseymanur.com

sblwarwickshire.co.uk

brazimaid.com

ciogame.com

bronzesailing.com

dwkapl.xyz

022dyd.com

compassandpathwriting.com

alphabet1x.com

selfcleaninghairbrush.co.uk

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 43 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1200
    • C:\Users\Admin\AppData\Local\Temp\invoice.exe
      "C:\Users\Admin\AppData\Local\Temp\invoice.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:528
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ROfIBwzK" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E00.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:736
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "{path}"
        3⤵
          PID:580
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "{path}"
          3⤵
            PID:1368
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "{path}"
            3⤵
              PID:268
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "{path}"
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:520
          • C:\Windows\SysWOW64\autoconv.exe
            "C:\Windows\SysWOW64\autoconv.exe"
            2⤵
              PID:284
            • C:\Windows\SysWOW64\autoconv.exe
              "C:\Windows\SysWOW64\autoconv.exe"
              2⤵
                PID:1764
              • C:\Windows\SysWOW64\autoconv.exe
                "C:\Windows\SysWOW64\autoconv.exe"
                2⤵
                  PID:672
                • C:\Windows\SysWOW64\autoconv.exe
                  "C:\Windows\SysWOW64\autoconv.exe"
                  2⤵
                    PID:1852
                  • C:\Windows\SysWOW64\autoconv.exe
                    "C:\Windows\SysWOW64\autoconv.exe"
                    2⤵
                      PID:108
                    • C:\Windows\SysWOW64\autoconv.exe
                      "C:\Windows\SysWOW64\autoconv.exe"
                      2⤵
                        PID:1708
                      • C:\Windows\SysWOW64\autoconv.exe
                        "C:\Windows\SysWOW64\autoconv.exe"
                        2⤵
                          PID:1576
                        • C:\Windows\SysWOW64\autoconv.exe
                          "C:\Windows\SysWOW64\autoconv.exe"
                          2⤵
                            PID:1792
                          • C:\Windows\SysWOW64\autoconv.exe
                            "C:\Windows\SysWOW64\autoconv.exe"
                            2⤵
                              PID:1564
                            • C:\Windows\SysWOW64\autoconv.exe
                              "C:\Windows\SysWOW64\autoconv.exe"
                              2⤵
                                PID:552
                              • C:\Windows\SysWOW64\autoconv.exe
                                "C:\Windows\SysWOW64\autoconv.exe"
                                2⤵
                                  PID:1948
                                • C:\Windows\SysWOW64\autoconv.exe
                                  "C:\Windows\SysWOW64\autoconv.exe"
                                  2⤵
                                    PID:1892
                                  • C:\Windows\SysWOW64\autoconv.exe
                                    "C:\Windows\SysWOW64\autoconv.exe"
                                    2⤵
                                      PID:1780
                                    • C:\Windows\SysWOW64\autoconv.exe
                                      "C:\Windows\SysWOW64\autoconv.exe"
                                      2⤵
                                        PID:740
                                      • C:\Windows\SysWOW64\autoconv.exe
                                        "C:\Windows\SysWOW64\autoconv.exe"
                                        2⤵
                                          PID:1232
                                        • C:\Windows\SysWOW64\autofmt.exe
                                          "C:\Windows\SysWOW64\autofmt.exe"
                                          2⤵
                                            PID:524
                                          • C:\Windows\SysWOW64\autofmt.exe
                                            "C:\Windows\SysWOW64\autofmt.exe"
                                            2⤵
                                              PID:768
                                            • C:\Windows\SysWOW64\autofmt.exe
                                              "C:\Windows\SysWOW64\autofmt.exe"
                                              2⤵
                                                PID:620
                                              • C:\Windows\SysWOW64\autofmt.exe
                                                "C:\Windows\SysWOW64\autofmt.exe"
                                                2⤵
                                                  PID:980
                                                • C:\Windows\SysWOW64\autofmt.exe
                                                  "C:\Windows\SysWOW64\autofmt.exe"
                                                  2⤵
                                                    PID:1788
                                                  • C:\Windows\SysWOW64\autofmt.exe
                                                    "C:\Windows\SysWOW64\autofmt.exe"
                                                    2⤵
                                                      PID:1080
                                                    • C:\Windows\SysWOW64\autofmt.exe
                                                      "C:\Windows\SysWOW64\autofmt.exe"
                                                      2⤵
                                                        PID:1152
                                                      • C:\Windows\SysWOW64\autofmt.exe
                                                        "C:\Windows\SysWOW64\autofmt.exe"
                                                        2⤵
                                                          PID:1288
                                                        • C:\Windows\SysWOW64\autofmt.exe
                                                          "C:\Windows\SysWOW64\autofmt.exe"
                                                          2⤵
                                                            PID:816
                                                          • C:\Windows\SysWOW64\autofmt.exe
                                                            "C:\Windows\SysWOW64\autofmt.exe"
                                                            2⤵
                                                              PID:1040
                                                            • C:\Windows\SysWOW64\autofmt.exe
                                                              "C:\Windows\SysWOW64\autofmt.exe"
                                                              2⤵
                                                                PID:1664
                                                              • C:\Windows\SysWOW64\wlanext.exe
                                                                "C:\Windows\SysWOW64\wlanext.exe"
                                                                2⤵
                                                                • Suspicious use of SetThreadContext
                                                                • Suspicious behavior: EnumeratesProcesses
                                                                • Suspicious behavior: MapViewOfSection
                                                                • Suspicious use of AdjustPrivilegeToken
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:300
                                                                • C:\Windows\SysWOW64\cmd.exe
                                                                  /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
                                                                  3⤵
                                                                    PID:1528

                                                              Network

                                                              MITRE ATT&CK Enterprise v6

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Temp\tmp6E00.tmp

                                                                Filesize

                                                                1KB

                                                                MD5

                                                                9cff0ca77a4ee5c901f1bd2e1b557f96

                                                                SHA1

                                                                dd215876d2ac54f4d77761532b48eb4216ee3411

                                                                SHA256

                                                                0d924cdf3f1a216880c7da02d16733092a072e541b39028b90629ae765da8223

                                                                SHA512

                                                                d5ca6e9cbc7ec3e47c5d4ea29c19571495a4352c7f729c9821cd09f583a0713de2c80fd0f854a928f7805193b580ecaf16f7ca097c35821223f2ebed8c6af8b2

                                                              • memory/300-75-0x0000000000930000-0x0000000000946000-memory.dmp

                                                                Filesize

                                                                88KB

                                                              • memory/300-82-0x0000000000850000-0x00000000008E4000-memory.dmp

                                                                Filesize

                                                                592KB

                                                              • memory/300-79-0x0000000000080000-0x00000000000AF000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/300-78-0x00000000021B0000-0x00000000024B3000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/300-77-0x0000000000080000-0x00000000000AF000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/300-76-0x0000000000930000-0x0000000000946000-memory.dmp

                                                                Filesize

                                                                88KB

                                                              • memory/520-74-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/520-71-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/520-64-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/520-66-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/520-68-0x0000000000B30000-0x0000000000E33000-memory.dmp

                                                                Filesize

                                                                3.0MB

                                                              • memory/520-65-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

                                                                Filesize

                                                                4KB

                                                              • memory/520-69-0x00000000001A0000-0x00000000001B5000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/520-63-0x0000000000400000-0x000000000042F000-memory.dmp

                                                                Filesize

                                                                188KB

                                                              • memory/520-72-0x0000000000230000-0x0000000000245000-memory.dmp

                                                                Filesize

                                                                84KB

                                                              • memory/528-55-0x0000000004E20000-0x0000000004E60000-memory.dmp

                                                                Filesize

                                                                256KB

                                                              • memory/528-56-0x0000000000450000-0x000000000045C000-memory.dmp

                                                                Filesize

                                                                48KB

                                                              • memory/528-54-0x0000000001040000-0x00000000010FC000-memory.dmp

                                                                Filesize

                                                                752KB

                                                              • memory/528-59-0x00000000047D0000-0x000000000481A000-memory.dmp

                                                                Filesize

                                                                296KB

                                                              • memory/528-58-0x0000000004D50000-0x0000000004DEC000-memory.dmp

                                                                Filesize

                                                                624KB

                                                              • memory/528-57-0x0000000004E20000-0x0000000004E60000-memory.dmp

                                                                Filesize

                                                                256KB

                                                              • memory/1200-70-0x0000000004CA0000-0x0000000004E16000-memory.dmp

                                                                Filesize

                                                                1.5MB

                                                              • memory/1200-73-0x0000000004E20000-0x0000000004F8E000-memory.dmp

                                                                Filesize

                                                                1.4MB

                                                              • memory/1200-83-0x0000000006430000-0x0000000006545000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1200-84-0x0000000006430000-0x0000000006545000-memory.dmp

                                                                Filesize

                                                                1.1MB

                                                              • memory/1200-86-0x0000000006430000-0x0000000006545000-memory.dmp

                                                                Filesize

                                                                1.1MB