Analysis

  • max time kernel
    148s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230703-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system
  • submitted
    28/08/2023, 11:04

General

  • Target

    Product Specifications xlsx.exe

  • Size

    254KB

  • MD5

    ac43233dd5fe6d55c112660dc700e564

  • SHA1

    2f431f411c707593f2f4bd67da5db2e9a9593778

  • SHA256

    d93182b7b2c8633aa7f379efdc80aa778ecc0b59a01929bb10a02cd8349354d2

  • SHA512

    a3fd81e3d3e4e7271ef1536e8f0c10c945780a916e168bd19bd67e03dd2a326b5910bf528220aa24ccd8799e02b50fbc30e953b3cde2c3d8a2c0dffd0278c770

  • SSDEEP

    6144:/Ya6lEiLxFG1cz5mqDoGPuduieEJE827qVkF28m4znusYtq4yC:/Y3EUxFzz57Dooudu9A5ko4zusYtFyC

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sn26

Decoy

resenha10.bet

gulshan-rajput.com

xbus.tech

z813my.cfd

wlxzjlny.cfd

auntengotiempo.com

canada-reservation.com

thegiftcompany.shop

esthersilveirapropiedades.com

1wapws.top

ymjblnvo.cfd

termokimik.net

kushiro-artist-school.com

bmmboo.com

caceresconstructionservices.com

kentuckywalkabout.com

bringyourcart.com

miamiwinetour.com

bobcatsocial.site

thirdmind.network

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:2512
    • C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe
      "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of SetThreadContext
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of WriteProcessMemory
      PID:3752
      • C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe
        "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:4556
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\SysWOW64\cmd.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4732
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\Product Specifications xlsx.exe"
        3⤵
          PID:3540

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\nsa7978.tmp\hutskogno.dll

            Filesize

            46KB

            MD5

            588cb1a8e7a30760b06e0d17e1d530da

            SHA1

            81c3b8ad80b3eab1cca85efaba50cc06f4fea922

            SHA256

            0e48e95e34121c2872695725e6bc3a7b266112437733fe9d7f290e72d201f97c

            SHA512

            bb3e2bd8a7f9ee3693c5d777352eff23c2c4aaf61adf8954166f6b05d163307c55a33ae06d423c569485b92e51336c09db62c2393d131ab40b1f21663dc89644

          • memory/2512-21-0x0000000008DA0000-0x0000000008E65000-memory.dmp

            Filesize

            788KB

          • memory/2512-27-0x0000000009280000-0x0000000009344000-memory.dmp

            Filesize

            784KB

          • memory/2512-25-0x0000000009280000-0x0000000009344000-memory.dmp

            Filesize

            784KB

          • memory/2512-24-0x0000000009280000-0x0000000009344000-memory.dmp

            Filesize

            784KB

          • memory/2512-12-0x0000000008DA0000-0x0000000008E65000-memory.dmp

            Filesize

            788KB

          • memory/3752-6-0x00000000031B0000-0x00000000031B2000-memory.dmp

            Filesize

            8KB

          • memory/4556-10-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4556-11-0x00000000005D0000-0x00000000005E5000-memory.dmp

            Filesize

            84KB

          • memory/4556-8-0x0000000000AC0000-0x0000000000E0A000-memory.dmp

            Filesize

            3.3MB

          • memory/4556-7-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4732-17-0x0000000000790000-0x00000000007EA000-memory.dmp

            Filesize

            360KB

          • memory/4732-18-0x0000000000B00000-0x0000000000B2F000-memory.dmp

            Filesize

            188KB

          • memory/4732-19-0x0000000001450000-0x000000000179A000-memory.dmp

            Filesize

            3.3MB

          • memory/4732-20-0x0000000000B00000-0x0000000000B2F000-memory.dmp

            Filesize

            188KB

          • memory/4732-13-0x0000000000790000-0x00000000007EA000-memory.dmp

            Filesize

            360KB

          • memory/4732-23-0x00000000011F0000-0x0000000001284000-memory.dmp

            Filesize

            592KB