Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows7_x64
  • resource
    win7-20230220-en
  • resource tags

    arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system
  • submitted
    19/05/2023, 11:37

General

  • Target

    Quotaion-pdf-.exe

  • Size

    908KB

  • MD5

    784b7d12402a2b9900c3b0228312b5ac

  • SHA1

    d2380976badb2ad8cdd0b0b38aaa22d989a95bc0

  • SHA256

    04a56a61c1ee4f2b5710672cc9d7564086746e99d1e1ea32baf845c5be3758ce

  • SHA512

    934efc840ccd863cf88eac934a03823d385f618bb596195552ddebcc84c42c990bf26130a4af6d7edec5353022bc720ab1b75d9e9f1d7f274db3df9d8fd64a0a

  • SSDEEP

    12288:DrLpNaPn0YPX/N94+OCreCEl1aa8UJlUTcRssz573VP+cZegdgmCn7ravxhXaFXE:CP0tZCEln/JNlZdgN7rE0X

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ae30

Decoy

lili116.ru

apatitum.ru

broadbandterbaik.com

flrfteb.ru

xysklhgf.xyz

thevelvetkit.africa

zwelethugh.africa

imassageandstretchdance.com

laser3dstudio.com

efefplantation.buzz

cyberwisely.com

hulihuli.net

electrosertecnologia.com

golanglearn.club

cee4agency.com

bedicustomgraphicapparel.com

aim2fitness.com

greenarrow-advisors.com

lotadan.com

kgaming.dev

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Deletes itself 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 23 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1260
    • C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe
      "C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1704
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\qQjtcTvQ.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1664
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\qQjtcTvQ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp451C.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:664
      • C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe
        "C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1884
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Quotaion-pdf-.exe"
        3⤵
        • Deletes itself
        PID:840

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\tmp451C.tmp

    Filesize

    1KB

    MD5

    97556fc4cbf5ac98cf1a0bda6f0349aa

    SHA1

    880b03f6c035d75d70249db4589618cf8d83cb80

    SHA256

    c624d5392f29223eec88e7a3c6194186eded5dee47fb3d4f9a0c49d147f473b7

    SHA512

    ae754e5cc991434264b2af742c6f87ffab3a4bcdf1919bb99fa73c5d28fce35b27e1574269e155392fb8d3eb2bd9f443793e544b1aab28be2de7101ba5d911b1

  • memory/1260-90-0x0000000006470000-0x000000000654B000-memory.dmp

    Filesize

    876KB

  • memory/1260-88-0x0000000006470000-0x000000000654B000-memory.dmp

    Filesize

    876KB

  • memory/1260-76-0x0000000007360000-0x000000000750D000-memory.dmp

    Filesize

    1.7MB

  • memory/1260-87-0x0000000006470000-0x000000000654B000-memory.dmp

    Filesize

    876KB

  • memory/1260-85-0x0000000003A30000-0x0000000003B30000-memory.dmp

    Filesize

    1024KB

  • memory/1624-86-0x00000000006A0000-0x0000000000733000-memory.dmp

    Filesize

    588KB

  • memory/1624-83-0x00000000000C0000-0x00000000000EF000-memory.dmp

    Filesize

    188KB

  • memory/1624-82-0x0000000000B00000-0x0000000000E03000-memory.dmp

    Filesize

    3.0MB

  • memory/1624-81-0x00000000000C0000-0x00000000000EF000-memory.dmp

    Filesize

    188KB

  • memory/1624-80-0x0000000000AF0000-0x0000000000AF8000-memory.dmp

    Filesize

    32KB

  • memory/1624-79-0x0000000000AF0000-0x0000000000AF8000-memory.dmp

    Filesize

    32KB

  • memory/1664-78-0x0000000002630000-0x0000000002670000-memory.dmp

    Filesize

    256KB

  • memory/1664-77-0x0000000002630000-0x0000000002670000-memory.dmp

    Filesize

    256KB

  • memory/1704-65-0x0000000005550000-0x00000000055BA000-memory.dmp

    Filesize

    424KB

  • memory/1704-54-0x0000000000B20000-0x0000000000C06000-memory.dmp

    Filesize

    920KB

  • memory/1704-55-0x00000000005A0000-0x00000000005E0000-memory.dmp

    Filesize

    256KB

  • memory/1704-56-0x0000000000290000-0x00000000002A0000-memory.dmp

    Filesize

    64KB

  • memory/1704-57-0x00000000005A0000-0x00000000005E0000-memory.dmp

    Filesize

    256KB

  • memory/1704-58-0x00000000002A0000-0x00000000002AA000-memory.dmp

    Filesize

    40KB

  • memory/1704-59-0x00000000056D0000-0x0000000005770000-memory.dmp

    Filesize

    640KB

  • memory/1884-69-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1884-66-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1884-67-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1884-68-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1884-73-0x0000000000C10000-0x0000000000F13000-memory.dmp

    Filesize

    3.0MB

  • memory/1884-75-0x0000000000190000-0x00000000001A4000-memory.dmp

    Filesize

    80KB

  • memory/1884-74-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB