Analysis

  • max time kernel
    149s
  • max time network
    142s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230621-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/06/2023, 14:09

General

  • Target

    shegro2.1.exe

  • Size

    236KB

  • MD5

    fe7fb44408912cfcc134fece3697776b

  • SHA1

    f4ba9fd0270bcd4ce6090e950cdeae5bd9880432

  • SHA256

    2a8783a8fa5d2994fdce8d2bce2aeb59434d13534e9f13ccae8de38f72f0798f

  • SHA512

    f3848e8410fa82a497634f6888f19483cb6f65a7a16d1b85921d0d3e2e710c167b82dd27ab163cf83270a3bcc2cdeed7b6264c084c37b1a887e35c1b492f86db

  • SSDEEP

    6144:PYa6erNOk21nYN/GQT/J/gUNF8vx+SdJmdMmitT:PYIJEYN/GiJ4GF8vx3dJmdZG

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sy18

Decoy

mgn4.com

gemellebeauty.com

emj2x.top

melissamcduffee.com

holangman.top

cqmksw.com

pinax.info

u2sr03.shop

weighing.xyz

jetcasinosite-official6.top

xyz.ngo

suandoc.xyz

aboutwean.site

stockprob.com

bawdydesignz.com

buddybooster.net

scuderiaexotics.com

design-de-interiores.wiki

shipsmartstore.com

patricklloydrunning.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3216
    • C:\Users\Admin\AppData\Local\Temp\shegro2.1.exe
      "C:\Users\Admin\AppData\Local\Temp\shegro2.1.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2080
      • C:\Users\Admin\AppData\Local\Temp\shegro2.1.exe
        "C:\Users\Admin\AppData\Local\Temp\shegro2.1.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4700
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\shegro2.1.exe"
        3⤵
          PID:2816

    Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsbF17B.tmp\jnvtgbomfe.dll

            Filesize

            4KB

            MD5

            236bddbd45b2ecabfca5a9e1aec6604e

            SHA1

            d04ab12768dd2401877c7e92bc6a89f5188b98fc

            SHA256

            cd8f85488967fd784f34554ce2598ff0c935818d5f81d7e9303e8985e3e58db0

            SHA512

            c33c10a62c6a29312756f91a85365363885f942cfecfecbe3841d16c5c2588e0b5d4f7778e5bc20ecbb11363710bf890b33e65d1fad6bccc5291bd643eff0bf6

          • memory/2080-140-0x0000000003310000-0x0000000003312000-memory.dmp

            Filesize

            8KB

          • memory/3216-174-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-194-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-208-0x0000000002F70000-0x0000000002F7A000-memory.dmp

            Filesize

            40KB

          • memory/3216-207-0x0000000002F50000-0x0000000002F52000-memory.dmp

            Filesize

            8KB

          • memory/3216-146-0x0000000008BA0000-0x0000000008D45000-memory.dmp

            Filesize

            1.6MB

          • memory/3216-206-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-205-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-176-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-204-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-203-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-156-0x0000000008BA0000-0x0000000008D45000-memory.dmp

            Filesize

            1.6MB

          • memory/3216-202-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-158-0x0000000003460000-0x0000000003504000-memory.dmp

            Filesize

            656KB

          • memory/3216-159-0x0000000003460000-0x0000000003504000-memory.dmp

            Filesize

            656KB

          • memory/3216-161-0x0000000003460000-0x0000000003504000-memory.dmp

            Filesize

            656KB

          • memory/3216-163-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-164-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-165-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-166-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-167-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-168-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-169-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-171-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-173-0x0000000003540000-0x0000000003550000-memory.dmp

            Filesize

            64KB

          • memory/3216-172-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-170-0x0000000003540000-0x0000000003550000-memory.dmp

            Filesize

            64KB

          • memory/3216-201-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-200-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-175-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-177-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-178-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-179-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-180-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-181-0x0000000003540000-0x0000000003550000-memory.dmp

            Filesize

            64KB

          • memory/3216-183-0x0000000003540000-0x0000000003550000-memory.dmp

            Filesize

            64KB

          • memory/3216-184-0x0000000003540000-0x0000000003550000-memory.dmp

            Filesize

            64KB

          • memory/3216-185-0x0000000003540000-0x0000000003550000-memory.dmp

            Filesize

            64KB

          • memory/3216-191-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-192-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-193-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-199-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-195-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-196-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-197-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/3216-198-0x0000000003510000-0x0000000003520000-memory.dmp

            Filesize

            64KB

          • memory/4700-141-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4700-143-0x00000000009F0000-0x0000000000D3A000-memory.dmp

            Filesize

            3.3MB

          • memory/4700-145-0x00000000006E0000-0x00000000006F4000-memory.dmp

            Filesize

            80KB

          • memory/4700-144-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4792-152-0x0000000000B40000-0x0000000000B6F000-memory.dmp

            Filesize

            188KB

          • memory/4792-157-0x0000000001310000-0x00000000013A3000-memory.dmp

            Filesize

            588KB

          • memory/4792-154-0x0000000000B40000-0x0000000000B6F000-memory.dmp

            Filesize

            188KB

          • memory/4792-153-0x00000000015E0000-0x000000000192A000-memory.dmp

            Filesize

            3.3MB

          • memory/4792-151-0x0000000000670000-0x00000000006CA000-memory.dmp

            Filesize

            360KB

          • memory/4792-148-0x0000000000670000-0x00000000006CA000-memory.dmp

            Filesize

            360KB