Analysis

  • max time kernel
    149s
  • max time network
    140s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    15/08/2023, 06:26

General

  • Target

    PO 0049 & 0050.xls

  • Size

    1.3MB

  • MD5

    35d4ccea11ed9d1e96ef88328ff609ed

  • SHA1

    8580de4fc69b1e89c2b2fdde2ecc8ee688d33aa0

  • SHA256

    c0a4c73ac3739d0be9f611a8227800b9b9f19a9bd06b5a82d9007cc5e54a430c

  • SHA512

    edc7352f76d2def45551d96cf028e7a11f00236e8aca86feb2f29f7b45fcd492e7192dcddceb3fd477f334d2e60b1043179ac5d4bc9f0241c0d40b5fd2dc162b

  • SSDEEP

    24576:3aZy0w6VgjKaWlEzp7aoZydw6VjjKaWlEzp7aczd6f/b7QAUQp5E/zwkx:3E86VgjKjOzdJ6VjjKjOzJdU7/UX/z7

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sy22

Decoy

vinteligencia.com

displayfridges.fun

completetip.com

giallozafferrano.com

jizihao1.com

mysticheightstrail.com

fourseasonslb.com

kjnala.shop

mosiacwall.com

vandistreet.com

gracefullytouchedartistry.com

hbiwhwr.shop

mfmz.net

hrmbrillianz.com

funwarsztat.com

polewithcandy.com

ourrajasthan.com

wilhouettteamerica.com

johnnystintshop.com

asgnelwin.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 6 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1196
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\PO 0049 & 0050.xls"
      2⤵
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2828
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2940
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\dasHost.exe"
        3⤵
          PID:1536
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\Temp\dasHost.exe
        "C:\Users\Admin\AppData\Local\Temp\dasHost.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\dasHost.exe
          "C:\Users\Admin\AppData\Local\Temp\dasHost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1460

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\2ECAE6B8.emf

            Filesize

            1.4MB

            MD5

            a01b9617553432807b9b58025b338d97

            SHA1

            439bdcc450408b9735b2428c2d53d2e6977fa58c

            SHA256

            7a0426ed2e2349916969ff7087c0f76089fb8ce7f4627f3d11ccbc1aaefcedce

            SHA512

            312cc2563fa865d6a939fea85a520627c73ed9a95bafc98c89495f21d535dc658825be74b64f0f5c5815d1d234fc6e77a71779247e4973e39ba8dccec2f09bee

          • C:\Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • C:\Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • C:\Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • C:\Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • \Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • \Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • \Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • \Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • \Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • \Users\Admin\AppData\Local\Temp\dasHost.exe

            Filesize

            537KB

            MD5

            95571a298ef4d99dcddfa704ad8d6ffe

            SHA1

            9129035adf05ce647285af4c89af5e4d9779ad59

            SHA256

            64e35a2e1b03234d3cfc33d6ea3b23cdf45be5fb39f2650b797128b967559717

            SHA512

            c01c660acba9ca2921f44df8ed769e9e2cb3c772c4164f59cf216fb4a0e6e66163639d2f7bcca6d51b73cd247da8aa9a9b990014022fb271f05423414093a7b1

          • memory/1196-116-0x0000000009630000-0x0000000009799000-memory.dmp

            Filesize

            1.4MB

          • memory/1196-113-0x0000000009630000-0x0000000009799000-memory.dmp

            Filesize

            1.4MB

          • memory/1196-103-0x00000000074B0000-0x00000000075FC000-memory.dmp

            Filesize

            1.3MB

          • memory/1196-114-0x0000000009630000-0x0000000009799000-memory.dmp

            Filesize

            1.4MB

          • memory/1460-102-0x00000000001D0000-0x00000000001E4000-memory.dmp

            Filesize

            80KB

          • memory/1460-101-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1460-99-0x0000000000990000-0x0000000000C93000-memory.dmp

            Filesize

            3.0MB

          • memory/1460-96-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1460-94-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

            Filesize

            4KB

          • memory/1460-92-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/1460-93-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/2740-82-0x0000000000120000-0x00000000001AC000-memory.dmp

            Filesize

            560KB

          • memory/2740-85-0x0000000000430000-0x0000000000440000-memory.dmp

            Filesize

            64KB

          • memory/2740-89-0x0000000000700000-0x000000000070E000-memory.dmp

            Filesize

            56KB

          • memory/2740-98-0x000000006C030000-0x000000006C71E000-memory.dmp

            Filesize

            6.9MB

          • memory/2740-88-0x0000000004F70000-0x0000000004FB0000-memory.dmp

            Filesize

            256KB

          • memory/2740-87-0x000000006C030000-0x000000006C71E000-memory.dmp

            Filesize

            6.9MB

          • memory/2740-83-0x000000006C030000-0x000000006C71E000-memory.dmp

            Filesize

            6.9MB

          • memory/2740-84-0x0000000004F70000-0x0000000004FB0000-memory.dmp

            Filesize

            256KB

          • memory/2740-90-0x00000000050F0000-0x000000000515E000-memory.dmp

            Filesize

            440KB

          • memory/2828-135-0x0000000073A0D000-0x0000000073A18000-memory.dmp

            Filesize

            44KB

          • memory/2828-124-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2828-55-0x0000000073A0D000-0x0000000073A18000-memory.dmp

            Filesize

            44KB

          • memory/2828-54-0x000000005FFF0000-0x0000000060000000-memory.dmp

            Filesize

            64KB

          • memory/2828-86-0x0000000073A0D000-0x0000000073A18000-memory.dmp

            Filesize

            44KB

          • memory/2940-105-0x00000000000F0000-0x00000000000F8000-memory.dmp

            Filesize

            32KB

          • memory/2940-110-0x0000000000630000-0x00000000006C3000-memory.dmp

            Filesize

            588KB

          • memory/2940-108-0x0000000000080000-0x00000000000AF000-memory.dmp

            Filesize

            188KB

          • memory/2940-107-0x0000000000810000-0x0000000000B13000-memory.dmp

            Filesize

            3.0MB

          • memory/2940-106-0x0000000000080000-0x00000000000AF000-memory.dmp

            Filesize

            188KB

          • memory/2940-104-0x00000000000F0000-0x00000000000F8000-memory.dmp

            Filesize

            32KB