Analysis

  • max time kernel
    147s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    08-05-2023 15:46

General

  • Target

    PO-230102_May 2023.exe

  • Size

    222KB

  • MD5

    41b41296821338a634d99d5b5c749ec1

  • SHA1

    747470c76d47d50eaaa891edcc2f17b22b07d1c9

  • SHA256

    272872a41e4e0ae720f6f61e50320720cf0313fe65d4c039334ed6c0cb7f37b0

  • SHA512

    7e6e6892661051c9135ca042bc0af85dbbee366080ac326893a62666c4f54401bf1111b1c60c300f3a29b9ad26dfd71848a622215917f739d29ad882451e5ed0

  • SSDEEP

    3072:d0gHHDGWvgDE4u+gCGHjEmELWQ88ffVls4:WkDBuEawAWE3Vls

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

g3th

Decoy

casemierlawncare.com

715harrison.com

laiwudj.com

jhy6id3bgsu.cfd

gewnaj.xyz

hullo.social

animejoyy.com

florenceodd.click

accountingassociatesil.com

cxuu39.shop

isabelladowns.com

checkstart.net

b2bmails.ru

wehantz.com

thejjwhyte.com

jerusalemfoundationsusa.com

newagreement19.com

findel.xyz

czanniversaryring.com

ape5n.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Users\Admin\AppData\Local\Temp\PO-230102_May 2023.exe
      "C:\Users\Admin\AppData\Local\Temp\PO-230102_May 2023.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1232
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1948
    • C:\Windows\SysWOW64\chkdsk.exe
      "C:\Windows\SysWOW64\chkdsk.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1748
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
        3⤵
          PID:1856

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1196-80-0x0000000004E30000-0x0000000004F11000-memory.dmp

      Filesize

      900KB

    • memory/1196-68-0x0000000004D70000-0x0000000004E24000-memory.dmp

      Filesize

      720KB

    • memory/1196-77-0x0000000004E30000-0x0000000004F11000-memory.dmp

      Filesize

      900KB

    • memory/1196-78-0x0000000004E30000-0x0000000004F11000-memory.dmp

      Filesize

      900KB

    • memory/1232-57-0x0000000000430000-0x0000000000458000-memory.dmp

      Filesize

      160KB

    • memory/1232-54-0x0000000000B10000-0x0000000000B4E000-memory.dmp

      Filesize

      248KB

    • memory/1232-58-0x0000000005880000-0x0000000005912000-memory.dmp

      Filesize

      584KB

    • memory/1232-56-0x0000000006060000-0x0000000006168000-memory.dmp

      Filesize

      1.0MB

    • memory/1232-55-0x0000000000AB0000-0x0000000000AF0000-memory.dmp

      Filesize

      256KB

    • memory/1748-71-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/1748-76-0x0000000001E60000-0x0000000001EF4000-memory.dmp

      Filesize

      592KB

    • memory/1748-73-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/1748-72-0x0000000002090000-0x0000000002393000-memory.dmp

      Filesize

      3.0MB

    • memory/1748-69-0x0000000000490000-0x0000000000497000-memory.dmp

      Filesize

      28KB

    • memory/1748-70-0x0000000000490000-0x0000000000497000-memory.dmp

      Filesize

      28KB

    • memory/1948-60-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1948-66-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1948-67-0x0000000000140000-0x0000000000155000-memory.dmp

      Filesize

      84KB

    • memory/1948-65-0x0000000000AA0000-0x0000000000DA3000-memory.dmp

      Filesize

      3.0MB

    • memory/1948-63-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1948-62-0x00000000FFFDE000-0x00000000FFFDF000-memory.dmp

      Filesize

      4KB

    • memory/1948-61-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB