Analysis

  • max time kernel
    149s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    28-08-2023 14:22

General

  • Target

    PO23043_.exe

  • Size

    313KB

  • MD5

    c1d14a0b29a7f3829d1361363ec2e9b1

  • SHA1

    11aa2f0448e47835ec84f975c13b9bdb762e7ad3

  • SHA256

    b2d76e91d736201b7e8fb9780594693cfc3106285a4886e9b40007fdd7e56359

  • SHA512

    e85b8aef71f36657e32c8e7c38b34834774e8ffc782bcb34f6e75e2634b6725ddae97dac7f9f73c09099d5a656bde10c5ef5bad068db951a7f48990dc98c916b

  • SSDEEP

    6144:zYa6/oSLCCe6xEoeELdWc9K4TDRnqoW/U6k33K9uuo:zYZre6xEohLNJTDRniG3XN

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sy22

Decoy

vinteligencia.com

displayfridges.fun

completetip.com

giallozafferrano.com

jizihao1.com

mysticheightstrail.com

fourseasonslb.com

kjnala.shop

mosiacwall.com

vandistreet.com

gracefullytouchedartistry.com

hbiwhwr.shop

mfmz.net

hrmbrillianz.com

funwarsztat.com

polewithcandy.com

ourrajasthan.com

wilhouettteamerica.com

johnnystintshop.com

asgnelwin.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1400
    • C:\Users\Admin\AppData\Local\Temp\PO23043_.exe
      "C:\Users\Admin\AppData\Local\Temp\PO23043_.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1176
      • C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe
        "C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:2664
        • C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe
          "C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:840
    • C:\Windows\SysWOW64\mstsc.exe
      "C:\Windows\SysWOW64\mstsc.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe"
        3⤵
          PID:2160

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe

      Filesize

      180KB

      MD5

      92a4d1b9f1502d49331f26198f50af02

      SHA1

      8efb3f2b2ea6371ff6758c3e730e8d53f62d7bd2

      SHA256

      784a645c5182553682714915342285633521ec9127c5bdbc93dc8d381e8e9000

      SHA512

      bc42aabb01b177b78f430982954163f2792d7aa754807f0a1eaafbb50ae66e4492e538a7ee7ebb1abaa976d9fdb84a9f4668ba36991117491c2bcd31284cae61

    • C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe

      Filesize

      180KB

      MD5

      92a4d1b9f1502d49331f26198f50af02

      SHA1

      8efb3f2b2ea6371ff6758c3e730e8d53f62d7bd2

      SHA256

      784a645c5182553682714915342285633521ec9127c5bdbc93dc8d381e8e9000

      SHA512

      bc42aabb01b177b78f430982954163f2792d7aa754807f0a1eaafbb50ae66e4492e538a7ee7ebb1abaa976d9fdb84a9f4668ba36991117491c2bcd31284cae61

    • C:\Users\Admin\AppData\Local\Temp\nxbcmmta.exe

      Filesize

      180KB

      MD5

      92a4d1b9f1502d49331f26198f50af02

      SHA1

      8efb3f2b2ea6371ff6758c3e730e8d53f62d7bd2

      SHA256

      784a645c5182553682714915342285633521ec9127c5bdbc93dc8d381e8e9000

      SHA512

      bc42aabb01b177b78f430982954163f2792d7aa754807f0a1eaafbb50ae66e4492e538a7ee7ebb1abaa976d9fdb84a9f4668ba36991117491c2bcd31284cae61

    • C:\Users\Admin\AppData\Local\Temp\wzoed.vg

      Filesize

      205KB

      MD5

      4a8d933787e89f00dfdad2157c614b88

      SHA1

      d4f0d32fdca8d06bb67163b618b3f36867dbe12e

      SHA256

      492ef6ba0ee8ad45b50c18a31410fa7f4b9c271eb313ec9813233cf3313f294f

      SHA512

      fa57eb941ae02725a66fb9a8796bd4e88f2ebc7182e6e402c074492b2f2e36f83244fadd21d5f3529c123e45db46091decee1c1be547084b1f6c90145eb35a45

    • \Users\Admin\AppData\Local\Temp\nxbcmmta.exe

      Filesize

      180KB

      MD5

      92a4d1b9f1502d49331f26198f50af02

      SHA1

      8efb3f2b2ea6371ff6758c3e730e8d53f62d7bd2

      SHA256

      784a645c5182553682714915342285633521ec9127c5bdbc93dc8d381e8e9000

      SHA512

      bc42aabb01b177b78f430982954163f2792d7aa754807f0a1eaafbb50ae66e4492e538a7ee7ebb1abaa976d9fdb84a9f4668ba36991117491c2bcd31284cae61

    • \Users\Admin\AppData\Local\Temp\nxbcmmta.exe

      Filesize

      180KB

      MD5

      92a4d1b9f1502d49331f26198f50af02

      SHA1

      8efb3f2b2ea6371ff6758c3e730e8d53f62d7bd2

      SHA256

      784a645c5182553682714915342285633521ec9127c5bdbc93dc8d381e8e9000

      SHA512

      bc42aabb01b177b78f430982954163f2792d7aa754807f0a1eaafbb50ae66e4492e538a7ee7ebb1abaa976d9fdb84a9f4668ba36991117491c2bcd31284cae61

    • memory/840-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/840-10-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/840-13-0x0000000000930000-0x0000000000C33000-memory.dmp

      Filesize

      3.0MB

    • memory/840-16-0x0000000000370000-0x0000000000384000-memory.dmp

      Filesize

      80KB

    • memory/1400-18-0x0000000004A10000-0x0000000004B36000-memory.dmp

      Filesize

      1.1MB

    • memory/1400-28-0x00000000040D0000-0x00000000042D0000-memory.dmp

      Filesize

      2.0MB

    • memory/1400-35-0x000007FE83FF0000-0x000007FE83FFA000-memory.dmp

      Filesize

      40KB

    • memory/1400-34-0x000007FEF6960000-0x000007FEF6AA3000-memory.dmp

      Filesize

      1.3MB

    • memory/1400-17-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1400-33-0x0000000004B40000-0x0000000004BD9000-memory.dmp

      Filesize

      612KB

    • memory/1400-31-0x0000000004B40000-0x0000000004BD9000-memory.dmp

      Filesize

      612KB

    • memory/1400-30-0x0000000004B40000-0x0000000004BD9000-memory.dmp

      Filesize

      612KB

    • memory/1400-26-0x0000000004A10000-0x0000000004B36000-memory.dmp

      Filesize

      1.1MB

    • memory/2052-22-0x0000000000BE0000-0x0000000000CE4000-memory.dmp

      Filesize

      1.0MB

    • memory/2052-27-0x0000000000950000-0x00000000009E3000-memory.dmp

      Filesize

      588KB

    • memory/2052-25-0x00000000000C0000-0x00000000000EF000-memory.dmp

      Filesize

      188KB

    • memory/2052-24-0x00000000020F0000-0x00000000023F3000-memory.dmp

      Filesize

      3.0MB

    • memory/2052-23-0x00000000000C0000-0x00000000000EF000-memory.dmp

      Filesize

      188KB

    • memory/2052-19-0x0000000000BE0000-0x0000000000CE4000-memory.dmp

      Filesize

      1.0MB

    • memory/2664-6-0x00000000001D0000-0x00000000001D2000-memory.dmp

      Filesize

      8KB