Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/08/2023, 07:13

General

  • Target

    UAE61 - 4510793563 - ALTAHER CHEM LLC.exe

  • Size

    688KB

  • MD5

    5c412f0f22b162d7f32cdbc9e500a1fd

  • SHA1

    e116967f21c982cdd814d82d2d37594f5a806cce

  • SHA256

    8a6e40ffa6aabeda07bd1c75dd8566bdb498ed5ef0eb523e8371e2fecda47e36

  • SHA512

    dd7ad2c106dc1cb7da444807ef25c77da32bb8cb3fd27aaf86cd640d6873d2b0396eb2af2870c022c0387c8c85d11bc646662f3c28b152ff038b5495b360a1ef

  • SSDEEP

    12288:N5MY3kRIBx5xkUQAs371jl1INLMRUGl9zaasU:N6KkRm5BZs7p2aUGs

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ga83

Decoy

fastholdtalaric.mom

lokimusic.shop

sisucomms.xyz

techpass.net

tzyl197.com

merakibrokers.com

recargaswebdirectya.online

buzzinsourshot.net

ansuship.com

vawrs.com

osadchiy.site

bigdatacomponents.com

ssflsd.com

studiotecniconatasciafabbro.com

tiichat.com

counselingbank.com

4goodsolutions.xyz

blindajeparallantas.com

evergreenedu.xyz

dilital.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 50 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:780
    • C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe
      "C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4020
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\eetcYAaabIb.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2752
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eetcYAaabIb" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF32A.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:4228
      • C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe
        "C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3472
    • C:\Windows\SysWOW64\WWAHost.exe
      "C:\Windows\SysWOW64\WWAHost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4256
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\UAE61 - 4510793563 - ALTAHER CHEM LLC.exe"
        3⤵
          PID:640

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_i3kxdi5c.51d.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmpF32A.tmp

      Filesize

      1KB

      MD5

      2753a87e0852ab7c85603e9e8c6eb22e

      SHA1

      940b63c9941b5c060b5bf56a79af67f1570f3b93

      SHA256

      c1a94925efb296b1d5e3bb9d16b26cc18f1512c25244bbc28dbedc3c044c049e

      SHA512

      06ccb05d06b145c92727415c1d1faea7bfc499eb0276857dfb5f0c1ebe063d0486b887a98acde7e6e6049d5dd178be4898326d5336ac69a3d0a15da64a2bd037

    • memory/780-209-0x0000000008550000-0x00000000086A4000-memory.dmp

      Filesize

      1.3MB

    • memory/780-207-0x0000000008550000-0x00000000086A4000-memory.dmp

      Filesize

      1.3MB

    • memory/780-206-0x0000000008550000-0x00000000086A4000-memory.dmp

      Filesize

      1.3MB

    • memory/780-203-0x0000000008290000-0x00000000083FA000-memory.dmp

      Filesize

      1.4MB

    • memory/780-171-0x0000000008290000-0x00000000083FA000-memory.dmp

      Filesize

      1.4MB

    • memory/2752-193-0x00000000076E0000-0x00000000076EA000-memory.dmp

      Filesize

      40KB

    • memory/2752-195-0x00000000078F0000-0x0000000007986000-memory.dmp

      Filesize

      600KB

    • memory/2752-201-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/2752-146-0x0000000002A20000-0x0000000002A56000-memory.dmp

      Filesize

      216KB

    • memory/2752-148-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/2752-149-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/2752-198-0x0000000007990000-0x0000000007998000-memory.dmp

      Filesize

      32KB

    • memory/2752-152-0x00000000056D0000-0x0000000005CF8000-memory.dmp

      Filesize

      6.2MB

    • memory/2752-197-0x00000000079B0000-0x00000000079CA000-memory.dmp

      Filesize

      104KB

    • memory/2752-154-0x00000000053A0000-0x00000000053C2000-memory.dmp

      Filesize

      136KB

    • memory/2752-155-0x0000000005540000-0x00000000055A6000-memory.dmp

      Filesize

      408KB

    • memory/2752-196-0x00000000078A0000-0x00000000078AE000-memory.dmp

      Filesize

      56KB

    • memory/2752-158-0x0000000005D00000-0x0000000005D66000-memory.dmp

      Filesize

      408KB

    • memory/2752-191-0x0000000005090000-0x00000000050A0000-memory.dmp

      Filesize

      64KB

    • memory/2752-167-0x0000000006350000-0x000000000636E000-memory.dmp

      Filesize

      120KB

    • memory/2752-189-0x0000000007670000-0x000000000768A000-memory.dmp

      Filesize

      104KB

    • memory/2752-188-0x0000000007CC0000-0x000000000833A000-memory.dmp

      Filesize

      6.5MB

    • memory/2752-185-0x0000000006930000-0x000000000694E000-memory.dmp

      Filesize

      120KB

    • memory/2752-172-0x0000000007330000-0x0000000007362000-memory.dmp

      Filesize

      200KB

    • memory/2752-174-0x000000007FD70000-0x000000007FD80000-memory.dmp

      Filesize

      64KB

    • memory/2752-173-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/2752-175-0x0000000070D30000-0x0000000070D7C000-memory.dmp

      Filesize

      304KB

    • memory/3472-170-0x0000000000D90000-0x0000000000DA5000-memory.dmp

      Filesize

      84KB

    • memory/3472-150-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3472-169-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3472-166-0x0000000001260000-0x00000000015AA000-memory.dmp

      Filesize

      3.3MB

    • memory/4020-139-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/4020-137-0x0000000005600000-0x0000000005610000-memory.dmp

      Filesize

      64KB

    • memory/4020-134-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/4020-133-0x0000000000890000-0x0000000000942000-memory.dmp

      Filesize

      712KB

    • memory/4020-135-0x00000000058E0000-0x0000000005E84000-memory.dmp

      Filesize

      5.6MB

    • memory/4020-141-0x000000000A4D0000-0x000000000A56C000-memory.dmp

      Filesize

      624KB

    • memory/4020-138-0x0000000005350000-0x000000000535A000-memory.dmp

      Filesize

      40KB

    • memory/4020-153-0x0000000074470000-0x0000000074C20000-memory.dmp

      Filesize

      7.7MB

    • memory/4020-136-0x00000000053D0000-0x0000000005462000-memory.dmp

      Filesize

      584KB

    • memory/4020-140-0x0000000005600000-0x0000000005610000-memory.dmp

      Filesize

      64KB

    • memory/4256-194-0x0000000001A80000-0x0000000001DCA000-memory.dmp

      Filesize

      3.3MB

    • memory/4256-202-0x0000000000EC0000-0x0000000000EEF000-memory.dmp

      Filesize

      188KB

    • memory/4256-205-0x0000000001880000-0x0000000001914000-memory.dmp

      Filesize

      592KB

    • memory/4256-186-0x00000000004A0000-0x000000000057C000-memory.dmp

      Filesize

      880KB

    • memory/4256-190-0x00000000004A0000-0x000000000057C000-memory.dmp

      Filesize

      880KB

    • memory/4256-192-0x0000000000EC0000-0x0000000000EEF000-memory.dmp

      Filesize

      188KB