Analysis

  • max time kernel
    150s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    05/05/2023, 20:43

General

  • Target

    GHXCGHXCGJXC.exe

  • Size

    260KB

  • MD5

    a77431e2d2b1d029280cf0a47b113105

  • SHA1

    f87716cb580a6b5a48a8c3a9112abf070353eaf4

  • SHA256

    1e76071fd87642e4070b75b2f542d65d304dcbb8482e795610bd53b34c54bcb8

  • SHA512

    7c3bb123b65744851b37ec612f9c2541e1e4ee092069b1d9acd14e462251cfe35b471abb3da1c6669c1cfeb3ea677da9e708f1b37728b77e34e8a49b1f2793f8

  • SSDEEP

    6144:sTr7LaS2zIxSM8ZSPSl940ofQoEytRm5Krk6X8Plx:snS5zIxeu0ofOys6X8Plx

Malware Config

Extracted

Family

formbook

Campaign

pgnt

Decoy

0WG18LbM4lR9iqMRa4nlBzTb

jcfGYzPgZTqFZVO9FV2yIw==

laIfrdSC8/4CNg==

Q73ilev5GIWuOrAAFV2yIw==

Q2u/pMw7pv4sPA==

TbqvIUHwlQscPo0HFV2yIw==

8PNWfGPyE8n0IQ==

WtgROxXzvY2L

PryaRBNjm4eP

Y9Hdi06Cry1um9Sj68YAu1o=

3Gulyp7CMQtR78jvLkk=

JJ3GasTVTCRQT6Tfz6S6GlI=

RnS42bhb9tI0R6UpD6wOxriNxw==

he1mi2sOGfzTRGHnuA==

eaYjCtjxVjdU5XLRtBMBLKk9quA=

k9rTeEqYzzw8WaTfz6S6GlI=

5luVQwe2vJWKEAiMdF4=

MGW14L9OVk5Y5TaR6w/DqdhYxXVY

mAsYz6k6sQkDC0/DoHj9t1RPWLSgFQ==

y5klhuMbE8n0IQ==

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 27 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 8 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1248
    • C:\Users\Admin\AppData\Local\Temp\GHXCGHXCGJXC.exe
      "C:\Users\Admin\AppData\Local\Temp\GHXCGHXCGJXC.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1108
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\Regsvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:632
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1068
      • C:\Program Files\Mozilla Firefox\Firefox.exe
        "C:\Program Files\Mozilla Firefox\Firefox.exe"
        3⤵
          PID:1532

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\v0mtuf.zip

            Filesize

            435KB

            MD5

            c42ec8f35c6a06666e6ad54471a2728b

            SHA1

            c3cc57a816927fa616616939b4b7a63c2322cfa1

            SHA256

            22bb304aab3ec7a51fc4dc7749f304bbe01c5ec014144fbc8f86012dc3b0708b

            SHA512

            6fe9a3c3f861663b6408fd5136d202835a89344072996dd65dda14fa04707662a26d0c6ed482fd0606a270943112d9effc07424af90621094f6fbb88c8ff7eae

          • \Users\Admin\AppData\Local\Temp\sqlite3.dll

            Filesize

            832KB

            MD5

            07fb6d31f37fb1b4164bef301306c288

            SHA1

            4cb41af6d63a07324ef6b18b1a1f43ce94e25626

            SHA256

            06ddf0a370af00d994824605a8e1307ba138f89b2d864539f0d19e8804edac02

            SHA512

            cab4a7c5805b80851aba5f2c9b001fabc1416f6648d891f49eacc81fe79287c5baa01306a42298da722750b812a4ea85388ffae9200dcf656dd1d5b5b9323353

          • memory/632-68-0x00000000002C0000-0x00000000002D0000-memory.dmp

            Filesize

            64KB

          • memory/632-60-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/632-62-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/632-59-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/632-58-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/632-57-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/632-64-0x00000000008E0000-0x0000000000BE3000-memory.dmp

            Filesize

            3.0MB

          • memory/632-70-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/632-65-0x0000000000100000-0x0000000000110000-memory.dmp

            Filesize

            64KB

          • memory/632-67-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1068-71-0x00000000006B0000-0x00000000006B7000-memory.dmp

            Filesize

            28KB

          • memory/1068-125-0x0000000061E00000-0x0000000061EBD000-memory.dmp

            Filesize

            756KB

          • memory/1068-72-0x00000000006B0000-0x00000000006B7000-memory.dmp

            Filesize

            28KB

          • memory/1068-73-0x0000000000080000-0x00000000000AD000-memory.dmp

            Filesize

            180KB

          • memory/1068-74-0x0000000001F70000-0x0000000002273000-memory.dmp

            Filesize

            3.0MB

          • memory/1068-76-0x0000000001DE0000-0x0000000001E6F000-memory.dmp

            Filesize

            572KB

          • memory/1108-56-0x0000000000150000-0x000000000015A000-memory.dmp

            Filesize

            40KB

          • memory/1108-54-0x000000013F480000-0x000000013F4C4000-memory.dmp

            Filesize

            272KB

          • memory/1108-55-0x0000000000140000-0x0000000000146000-memory.dmp

            Filesize

            24KB

          • memory/1248-75-0x0000000000010000-0x0000000000020000-memory.dmp

            Filesize

            64KB

          • memory/1248-78-0x00000000070F0000-0x0000000007232000-memory.dmp

            Filesize

            1.3MB

          • memory/1248-80-0x0000000006FD0000-0x00000000070E1000-memory.dmp

            Filesize

            1.1MB

          • memory/1248-82-0x00000000070F0000-0x0000000007232000-memory.dmp

            Filesize

            1.3MB

          • memory/1248-77-0x00000000070F0000-0x0000000007232000-memory.dmp

            Filesize

            1.3MB

          • memory/1248-69-0x0000000006FD0000-0x00000000070E1000-memory.dmp

            Filesize

            1.1MB

          • memory/1248-66-0x0000000006C70000-0x0000000006E0C000-memory.dmp

            Filesize

            1.6MB