Analysis

  • max time kernel
    149s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20230621-en
  • resource tags

    arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system
  • submitted
    26-06-2023 07:30

General

  • Target

    30% Payment Receipt.rtf

  • Size

    42KB

  • MD5

    d4bc695be1f64cb89c061b21b06815a2

  • SHA1

    4056cdfa99fe137e1324be62763aee23d1990eb7

  • SHA256

    ad167c04c640a9777e7b6bb420e64b5cc46a0fd588820f6895420991465944a0

  • SHA512

    1ddb705be7d901acd7f9889bdfb4491ce4c5a9619884f083c79ac4046285d786e54ce6aabcf4eacbf6fc522804c27b8cc88f20b5077ef249d0f9c93390806221

  • SSDEEP

    768:rFx0XaIsnPRIa4fwJMo30VYWEfOH/cNUWTL4QUATxZA9fSP3/Uz+o4KSAIR:rf0Xvx3EMo32YWEfrkVAV//Uz+o46IR

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

xchu

Decoy

zcartoons.com

castilloshowroom.com

3bmmdtod.life

misaxoxo.com

nadiya.online

sykkbup29.xyz

triciaaprimrosevp.com

newleter.com

ptzslk.xyz

lightbulbfestival.com

texaslandline.com

ideeintemporelle.com

girljustdoitpodcast.com

medimediamarketing.com

bunk7outfitters.com

charlievgrfminnick.click

lifestyleinthehome.com

atfbestsale.online

frontdoorproperties.co.uk

grandpaswag2024.info

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Office loads VBA resources, possible macro or embedded object present
  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1252
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\30% Payment Receipt.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1144
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:1712
      • C:\Windows\SysWOW64\chkdsk.exe
        "C:\Windows\SysWOW64\chkdsk.exe"
        2⤵
        • Suspicious use of SetThreadContext
        • Enumerates system info in registry
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1640
        • C:\Windows\SysWOW64\cmd.exe
          /c del "C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe"
          3⤵
            PID:604
      • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
        "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
        1⤵
        • Blocklisted process makes network request
        • Loads dropped DLL
        • Launches Equation Editor
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe
          "C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe"
          2⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1648
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe"
            3⤵
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:884
          • C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe
            "C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe"
            3⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1604

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Exploitation for Client Execution

      1
      T1203

      Defense Evasion

      Modify Registry

      1
      T1112

      Discovery

      System Information Discovery

      2
      T1082

      Query Registry

      1
      T1012

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm
        Filesize

        20KB

        MD5

        090dffb43da1628858a0fdea440a87e9

        SHA1

        4e87d49ec2cfeacb3d24e78afb2f60f2e2b01e8d

        SHA256

        2044c1842d9f406ccf410960098c0cc0a8f57341cc7a66176f21790787c29df5

        SHA512

        0dff2caf8eb39718959bd17c75b418c8da3817b00fe143c09a6c627016a65bd0ad85de865b686f25377892f7c9df2515f150e6e104d311f15f45770198fdfa67

      • C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe
        Filesize

        662KB

        MD5

        40df500e4caa9265ef6bea269c34140d

        SHA1

        db34bb2e6dc20b945443faa9f5c5607a66638735

        SHA256

        9e4d05b5c07d77f2bf1fd7a22c59b4932f096ad1e140a536a025b5c325683073

        SHA512

        d51a238be322f12673fa76be731a123a2d0ca5c398a285e91a7a5bed231f4f1d5ca27e3ee0d4bd83502a064dec537a56fe9ed3f578c1e2e1595df8b7f2c7a347

      • C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe
        Filesize

        662KB

        MD5

        40df500e4caa9265ef6bea269c34140d

        SHA1

        db34bb2e6dc20b945443faa9f5c5607a66638735

        SHA256

        9e4d05b5c07d77f2bf1fd7a22c59b4932f096ad1e140a536a025b5c325683073

        SHA512

        d51a238be322f12673fa76be731a123a2d0ca5c398a285e91a7a5bed231f4f1d5ca27e3ee0d4bd83502a064dec537a56fe9ed3f578c1e2e1595df8b7f2c7a347

      • C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe
        Filesize

        662KB

        MD5

        40df500e4caa9265ef6bea269c34140d

        SHA1

        db34bb2e6dc20b945443faa9f5c5607a66638735

        SHA256

        9e4d05b5c07d77f2bf1fd7a22c59b4932f096ad1e140a536a025b5c325683073

        SHA512

        d51a238be322f12673fa76be731a123a2d0ca5c398a285e91a7a5bed231f4f1d5ca27e3ee0d4bd83502a064dec537a56fe9ed3f578c1e2e1595df8b7f2c7a347

      • C:\Users\Admin\AppData\Roaming\pablodfd4676529.exe
        Filesize

        662KB

        MD5

        40df500e4caa9265ef6bea269c34140d

        SHA1

        db34bb2e6dc20b945443faa9f5c5607a66638735

        SHA256

        9e4d05b5c07d77f2bf1fd7a22c59b4932f096ad1e140a536a025b5c325683073

        SHA512

        d51a238be322f12673fa76be731a123a2d0ca5c398a285e91a7a5bed231f4f1d5ca27e3ee0d4bd83502a064dec537a56fe9ed3f578c1e2e1595df8b7f2c7a347

      • \Users\Admin\AppData\Roaming\pablodfd4676529.exe
        Filesize

        662KB

        MD5

        40df500e4caa9265ef6bea269c34140d

        SHA1

        db34bb2e6dc20b945443faa9f5c5607a66638735

        SHA256

        9e4d05b5c07d77f2bf1fd7a22c59b4932f096ad1e140a536a025b5c325683073

        SHA512

        d51a238be322f12673fa76be731a123a2d0ca5c398a285e91a7a5bed231f4f1d5ca27e3ee0d4bd83502a064dec537a56fe9ed3f578c1e2e1595df8b7f2c7a347

      • memory/884-92-0x0000000002370000-0x00000000023B0000-memory.dmp
        Filesize

        256KB

      • memory/884-90-0x0000000002370000-0x00000000023B0000-memory.dmp
        Filesize

        256KB

      • memory/884-88-0x0000000002370000-0x00000000023B0000-memory.dmp
        Filesize

        256KB

      • memory/1144-127-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1144-54-0x000000005FFF0000-0x0000000060000000-memory.dmp
        Filesize

        64KB

      • memory/1252-101-0x0000000006E00000-0x0000000006EC4000-memory.dmp
        Filesize

        784KB

      • memory/1252-102-0x0000000006E00000-0x0000000006EC4000-memory.dmp
        Filesize

        784KB

      • memory/1252-105-0x0000000006E00000-0x0000000006EC4000-memory.dmp
        Filesize

        784KB

      • memory/1252-91-0x0000000006AA0000-0x0000000006BB5000-memory.dmp
        Filesize

        1.1MB

      • memory/1604-78-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1604-79-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1604-80-0x000000007EFDE000-0x000000007EFDF000-memory.dmp
        Filesize

        4KB

      • memory/1604-81-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1604-86-0x00000000008A0000-0x0000000000BA3000-memory.dmp
        Filesize

        3.0MB

      • memory/1604-87-0x0000000000400000-0x000000000042F000-memory.dmp
        Filesize

        188KB

      • memory/1604-89-0x00000000003E0000-0x00000000003F4000-memory.dmp
        Filesize

        80KB

      • memory/1640-94-0x00000000000C0000-0x00000000000C7000-memory.dmp
        Filesize

        28KB

      • memory/1640-93-0x00000000000C0000-0x00000000000C7000-memory.dmp
        Filesize

        28KB

      • memory/1640-96-0x0000000001EE0000-0x00000000021E3000-memory.dmp
        Filesize

        3.0MB

      • memory/1640-95-0x0000000000120000-0x000000000014F000-memory.dmp
        Filesize

        188KB

      • memory/1640-97-0x0000000000120000-0x000000000014F000-memory.dmp
        Filesize

        188KB

      • memory/1640-100-0x0000000001DE0000-0x0000000001E73000-memory.dmp
        Filesize

        588KB

      • memory/1648-77-0x0000000007E60000-0x0000000007ECE000-memory.dmp
        Filesize

        440KB

      • memory/1648-76-0x00000000004B0000-0x00000000004BC000-memory.dmp
        Filesize

        48KB

      • memory/1648-74-0x00000000042B0000-0x00000000042F0000-memory.dmp
        Filesize

        256KB

      • memory/1648-73-0x0000000000340000-0x000000000034C000-memory.dmp
        Filesize

        48KB

      • memory/1648-72-0x00000000042B0000-0x00000000042F0000-memory.dmp
        Filesize

        256KB

      • memory/1648-67-0x0000000000030000-0x00000000000DC000-memory.dmp
        Filesize

        688KB