Analysis

  • max time kernel
    152s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    25/05/2023, 16:24

General

  • Target

    602QN20427-1.exe

  • Size

    719KB

  • MD5

    6991d190933968b416189fe78bbb2d8b

  • SHA1

    046a63283cf4eb75656bb4f4c99413fbd0f86e3b

  • SHA256

    8b9641ea4b07a7e2e48a7be9f45a20b7c0663838d5430c90b452729843f4ea21

  • SHA512

    d8e98ba1818f7ba3f32ae516cb4e059c8a8264333499c11595ade883aed89cf1ea449d38646fa1061ffc76e2b990e11e747215b8a5aad2d9060f4c38cb6ee509

  • SSDEEP

    12288:9uzZBEP85trggY+9nmp35FVk9V7Sm3Ucu3eL8Xt1O6ctdWv0bO0lGbw:Q9BEP8wgYOcw313UcuuIXtNc+v0b7oE

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ce18

Decoy

kenfinnegan.com

exopestireland.com

allthingzbeautiellc.com

attractiveidiot.com

calmsealight.com

ectobyte.com

8rr.xyz

hcmajq.info

alisongraceventures.com

jamtanganbagus.online

forexpropfirmmastery.com

coupimmobilier.com

amarisetechnologies.com

countrykidsclothing.com

eyecatcher.tech

merxip.online

fiteallc.com

themensroombarber.co.uk

seroofingtelford.co.uk

birdie786.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 42 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1920
    • C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe
      "C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:5004
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\CDQXpTCzh.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2836
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\CDQXpTCzh" /XML "C:\Users\Admin\AppData\Local\Temp\tmp90A7.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:3700
      • C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe
        "C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4104
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2408
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\602QN20427-1.exe"
        3⤵
          PID:664

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gp4ztja4.nh1.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp90A7.tmp

      Filesize

      1KB

      MD5

      a53f836971a2a822e5cb9804ef7ab7c9

      SHA1

      d27a28c04e41478d9850dda4047be3705a9f75d6

      SHA256

      00440c2ffea59051e0b891731cf6fa10e5cd976b86b45b7648a520e31a5b3f19

      SHA512

      f39a5526fa52d032b10e68c06fb42720c87dc7ccf9d3110e9bbc7e68a3a6ee04e4c7bf95c19587bf9f7c308e177e19866233f4dd1e0af5438a83d3cc284b1c8d

    • memory/1920-202-0x0000000008DD0000-0x0000000008F46000-memory.dmp

      Filesize

      1.5MB

    • memory/1920-200-0x0000000008DD0000-0x0000000008F46000-memory.dmp

      Filesize

      1.5MB

    • memory/1920-199-0x0000000008DD0000-0x0000000008F46000-memory.dmp

      Filesize

      1.5MB

    • memory/1920-167-0x00000000037F0000-0x00000000038A3000-memory.dmp

      Filesize

      716KB

    • memory/2408-198-0x0000000000A20000-0x0000000000AB4000-memory.dmp

      Filesize

      592KB

    • memory/2408-196-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2408-189-0x0000000000BC0000-0x0000000000F0A000-memory.dmp

      Filesize

      3.3MB

    • memory/2408-188-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2408-184-0x0000000000BB0000-0x0000000000BB7000-memory.dmp

      Filesize

      28KB

    • memory/2408-183-0x0000000000BB0000-0x0000000000BB7000-memory.dmp

      Filesize

      28KB

    • memory/2836-147-0x0000000005570000-0x0000000005B98000-memory.dmp

      Filesize

      6.2MB

    • memory/2836-168-0x0000000007360000-0x0000000007392000-memory.dmp

      Filesize

      200KB

    • memory/2836-156-0x0000000005CD0000-0x0000000005D36000-memory.dmp

      Filesize

      408KB

    • memory/2836-157-0x0000000005DB0000-0x0000000005E16000-memory.dmp

      Filesize

      408KB

    • memory/2836-159-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/2836-164-0x00000000063B0000-0x00000000063CE000-memory.dmp

      Filesize

      120KB

    • memory/2836-193-0x00000000079E0000-0x00000000079E8000-memory.dmp

      Filesize

      32KB

    • memory/2836-192-0x0000000007A00000-0x0000000007A1A000-memory.dmp

      Filesize

      104KB

    • memory/2836-150-0x0000000005C10000-0x0000000005C32000-memory.dmp

      Filesize

      136KB

    • memory/2836-144-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/2836-169-0x0000000072720000-0x000000007276C000-memory.dmp

      Filesize

      304KB

    • memory/2836-179-0x0000000006950000-0x000000000696E000-memory.dmp

      Filesize

      120KB

    • memory/2836-180-0x0000000004F30000-0x0000000004F40000-memory.dmp

      Filesize

      64KB

    • memory/2836-181-0x000000007F9C0000-0x000000007F9D0000-memory.dmp

      Filesize

      64KB

    • memory/2836-191-0x00000000078F0000-0x00000000078FE000-memory.dmp

      Filesize

      56KB

    • memory/2836-190-0x0000000007940000-0x00000000079D6000-memory.dmp

      Filesize

      600KB

    • memory/2836-145-0x0000000002A80000-0x0000000002AB6000-memory.dmp

      Filesize

      216KB

    • memory/2836-185-0x0000000007D00000-0x000000000837A000-memory.dmp

      Filesize

      6.5MB

    • memory/2836-186-0x00000000076C0000-0x00000000076DA000-memory.dmp

      Filesize

      104KB

    • memory/2836-187-0x0000000007730000-0x000000000773A000-memory.dmp

      Filesize

      40KB

    • memory/4104-148-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4104-182-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4104-166-0x0000000001270000-0x0000000001285000-memory.dmp

      Filesize

      84KB

    • memory/4104-165-0x00000000014A0000-0x00000000017EA000-memory.dmp

      Filesize

      3.3MB

    • memory/5004-139-0x00000000087B0000-0x000000000884C000-memory.dmp

      Filesize

      624KB

    • memory/5004-133-0x0000000000660000-0x000000000071A000-memory.dmp

      Filesize

      744KB

    • memory/5004-138-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/5004-137-0x00000000055C0000-0x00000000055CA000-memory.dmp

      Filesize

      40KB

    • memory/5004-136-0x0000000005250000-0x0000000005260000-memory.dmp

      Filesize

      64KB

    • memory/5004-135-0x00000000050F0000-0x0000000005182000-memory.dmp

      Filesize

      584KB

    • memory/5004-134-0x00000000056A0000-0x0000000005C44000-memory.dmp

      Filesize

      5.6MB