Analysis

  • max time kernel
    149s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 09:42

General

  • Target

    http://194.180.48.59/adolfzx.exe

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gg04

Decoy

clothandsoulfabricllc.com

kx1336.com

4638.global

fixlaunchcredtunionmemb.online

indivexport.com

betuluzun.online

colossusboutique.com

hgcst.com

authorizer.online

hong-travel.com

globalwealthstrategiesco.com

fobberq.com

tribally.net

cook-a.com

todipjane.africa

membershipexams.africa

3dseal.online

abris-spb.ru

mkkkkk.net

chargecentral.store

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 36 IoCs
  • Suspicious behavior: EnumeratesProcesses 36 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3116
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://194.180.48.59/adolfzx.exe
      2⤵
      • Modifies Internet Explorer Phishing Filter
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1680 CREDAT:17410 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:824
      • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe
        "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2908
        • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe
          "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:3108
    • C:\Windows\SysWOW64\netsh.exe
      "C:\Windows\SysWOW64\netsh.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3208
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe"
        3⤵
          PID:5104

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe

            Filesize

            906KB

            MD5

            372daff38ea8b876b01803b474c7f687

            SHA1

            3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf

            SHA256

            625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c

            SHA512

            9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe

            Filesize

            906KB

            MD5

            372daff38ea8b876b01803b474c7f687

            SHA1

            3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf

            SHA256

            625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c

            SHA512

            9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\4HAJQ22Y\adolfzx.exe.qk8y0o6.partial

            Filesize

            906KB

            MD5

            372daff38ea8b876b01803b474c7f687

            SHA1

            3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf

            SHA256

            625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c

            SHA512

            9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LZ0AI98S\adolfzx[1].exe

            Filesize

            906KB

            MD5

            372daff38ea8b876b01803b474c7f687

            SHA1

            3e27eb6a6e9ec8f8be6609c85bb6b16376907fcf

            SHA256

            625f5caa0e4422a01de12f875b7acf8c4edb699f36a7237c18bf3df7772a7e6c

            SHA512

            9a27b0c2f7f3bd66f30f2bffbde4c44d82b541ade528c034ba1cd4f0facd89d472a98550834b8cf79b67a40afd50dd5eb02cd87dacc161c6a88b2b26a0eb87e6

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\LZ0AI98S\suggestions[1].en-US

            Filesize

            17KB

            MD5

            5a34cb996293fde2cb7a4ac89587393a

            SHA1

            3c96c993500690d1a77873cd62bc639b3a10653f

            SHA256

            c6a5377cbc07eece33790cfc70572e12c7a48ad8296be25c0cc805a1f384dbad

            SHA512

            e1b7d0107733f81937415104e70f68b1be6fd0ca65dccf4ff72637943d44278d3a77f704aedff59d2dbc0d56a609b2590c8ec0dd6bc48ab30f1dad0c07a0a3ee

          • memory/2908-143-0x0000000000AA0000-0x0000000000B88000-memory.dmp

            Filesize

            928KB

          • memory/2908-144-0x0000000005AC0000-0x0000000006064000-memory.dmp

            Filesize

            5.6MB

          • memory/2908-145-0x00000000055B0000-0x0000000005642000-memory.dmp

            Filesize

            584KB

          • memory/2908-146-0x0000000005550000-0x000000000555A000-memory.dmp

            Filesize

            40KB

          • memory/2908-147-0x0000000005720000-0x0000000005730000-memory.dmp

            Filesize

            64KB

          • memory/2908-148-0x0000000005720000-0x0000000005730000-memory.dmp

            Filesize

            64KB

          • memory/2908-158-0x0000000007310000-0x00000000073AC000-memory.dmp

            Filesize

            624KB

          • memory/3108-163-0x0000000000F00000-0x000000000124A000-memory.dmp

            Filesize

            3.3MB

          • memory/3108-159-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3108-167-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/3108-164-0x00000000013F0000-0x0000000001404000-memory.dmp

            Filesize

            80KB

          • memory/3116-165-0x0000000008490000-0x0000000008617000-memory.dmp

            Filesize

            1.5MB

          • memory/3116-190-0x0000000008880000-0x00000000089EB000-memory.dmp

            Filesize

            1.4MB

          • memory/3116-189-0x0000000008880000-0x00000000089EB000-memory.dmp

            Filesize

            1.4MB

          • memory/3116-187-0x0000000008880000-0x00000000089EB000-memory.dmp

            Filesize

            1.4MB

          • memory/3208-171-0x0000000001A30000-0x0000000001D7A000-memory.dmp

            Filesize

            3.3MB

          • memory/3208-172-0x00000000011C0000-0x00000000011EF000-memory.dmp

            Filesize

            188KB

          • memory/3208-184-0x0000000001D80000-0x0000000001E13000-memory.dmp

            Filesize

            588KB

          • memory/3208-186-0x0000000001D80000-0x0000000001E13000-memory.dmp

            Filesize

            588KB

          • memory/3208-170-0x00000000011C0000-0x00000000011EF000-memory.dmp

            Filesize

            188KB

          • memory/3208-169-0x0000000000980000-0x000000000099E000-memory.dmp

            Filesize

            120KB

          • memory/3208-166-0x0000000000980000-0x000000000099E000-memory.dmp

            Filesize

            120KB