Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230824-en
  • resource tags

    arch:x64arch:x86image:win7-20230824-enlocale:en-usos:windows7-x64system
  • submitted
    28/08/2023, 11:04

General

  • Target

    Product Specifications xlsx.exe

  • Size

    254KB

  • MD5

    ac43233dd5fe6d55c112660dc700e564

  • SHA1

    2f431f411c707593f2f4bd67da5db2e9a9593778

  • SHA256

    d93182b7b2c8633aa7f379efdc80aa778ecc0b59a01929bb10a02cd8349354d2

  • SHA512

    a3fd81e3d3e4e7271ef1536e8f0c10c945780a916e168bd19bd67e03dd2a326b5910bf528220aa24ccd8799e02b50fbc30e953b3cde2c3d8a2c0dffd0278c770

  • SSDEEP

    6144:/Ya6lEiLxFG1cz5mqDoGPuduieEJE827qVkF28m4znusYtq4yC:/Y3EUxFzz57Dooudu9A5ko4zusYtFyC

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sn26

Decoy

resenha10.bet

gulshan-rajput.com

xbus.tech

z813my.cfd

wlxzjlny.cfd

auntengotiempo.com

canada-reservation.com

thegiftcompany.shop

esthersilveirapropiedades.com

1wapws.top

ymjblnvo.cfd

termokimik.net

kushiro-artist-school.com

bmmboo.com

caceresconstructionservices.com

kentuckywalkabout.com

bringyourcart.com

miamiwinetour.com

bobcatsocial.site

thirdmind.network

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Deletes itself 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1268
    • C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe
      "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:2060
      • C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe
        "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2644
    • C:\Windows\SysWOW64\wininit.exe
      "C:\Windows\SysWOW64\wininit.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"
        3⤵
        • Deletes itself
        PID:2592

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\nso343C.tmp\hutskogno.dll

          Filesize

          46KB

          MD5

          588cb1a8e7a30760b06e0d17e1d530da

          SHA1

          81c3b8ad80b3eab1cca85efaba50cc06f4fea922

          SHA256

          0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c

          SHA512

          bb3e2bd8a7f9ee3693c5d777352eff23c2c4aaf61adf8954166f6b05d163307c55a33ae06d423c569485b92e51336c09db62c2393d131ab40b1f21663dc89644

        • \Users\Admin\AppData\Local\Temp\nso343C.tmp\hutskogno.dll

          Filesize

          46KB

          MD5

          588cb1a8e7a30760b06e0d17e1d530da

          SHA1

          81c3b8ad80b3eab1cca85efaba50cc06f4fea922

          SHA256

          0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c

          SHA512

          bb3e2bd8a7f9ee3693c5d777352eff23c2c4aaf61adf8954166f6b05d163307c55a33ae06d423c569485b92e51336c09db62c2393d131ab40b1f21663dc89644

        • memory/1268-18-0x0000000002A70000-0x0000000002B70000-memory.dmp

          Filesize

          1024KB

        • memory/1268-33-0x0000000003D50000-0x0000000003DF3000-memory.dmp

          Filesize

          652KB

        • memory/1268-31-0x0000000003D50000-0x0000000003DF3000-memory.dmp

          Filesize

          652KB

        • memory/1268-12-0x0000000003E50000-0x0000000004050000-memory.dmp

          Filesize

          2.0MB

        • memory/1268-30-0x0000000003D50000-0x0000000003DF3000-memory.dmp

          Filesize

          652KB

        • memory/1268-27-0x0000000007450000-0x0000000007548000-memory.dmp

          Filesize

          992KB

        • memory/1268-14-0x0000000004EF0000-0x0000000005046000-memory.dmp

          Filesize

          1.3MB

        • memory/1268-19-0x0000000007450000-0x0000000007548000-memory.dmp

          Filesize

          992KB

        • memory/2060-7-0x00000000004C0000-0x00000000004C2000-memory.dmp

          Filesize

          8KB

        • memory/2644-17-0x0000000000390000-0x00000000003A5000-memory.dmp

          Filesize

          84KB

        • memory/2644-16-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2644-13-0x00000000002C0000-0x00000000002D5000-memory.dmp

          Filesize

          84KB

        • memory/2644-11-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2644-9-0x0000000000920000-0x0000000000C23000-memory.dmp

          Filesize

          3.0MB

        • memory/2644-8-0x0000000000400000-0x000000000042F000-memory.dmp

          Filesize

          188KB

        • memory/2936-21-0x0000000000090000-0x00000000000AA000-memory.dmp

          Filesize

          104KB

        • memory/2936-23-0x0000000000090000-0x00000000000AA000-memory.dmp

          Filesize

          104KB

        • memory/2936-24-0x00000000000B0000-0x00000000000DF000-memory.dmp

          Filesize

          188KB

        • memory/2936-25-0x0000000001F10000-0x0000000002213000-memory.dmp

          Filesize

          3.0MB

        • memory/2936-26-0x00000000000B0000-0x00000000000DF000-memory.dmp

          Filesize

          188KB

        • memory/2936-29-0x00000000003F0000-0x0000000000484000-memory.dmp

          Filesize

          592KB