Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2023 02:57

General

  • Target

    RFQ_Brazil.exe

  • Size

    665KB

  • MD5

    8c9063c775cdc83e37cc1627c2db4e35

  • SHA1

    fdb299c90896fe4da7296eea45e435eeaea01a93

  • SHA256

    ee68eb97a5b52851a5154c7078391f42c63dc93e093cfce520f57146bc1b2973

  • SHA512

    7deb68cc997fd3e049654c42c294317ab881ba72cb6bcb9d4ce0f499594d9c2a3a49125a217761c4a8d712e7838a50533bda464270cd309f3075fefe8fd91ae1

  • SSDEEP

    12288:+6n+XfJw1UN1PLRksi04MgJjIMbDu5innGNMd4MxajKRM9Hg:DKBw+JNc0EtSq5PIH

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

m0u5

Decoy

thefdigroup.com

ashirovinc.com

nbkbj.com

sundirect.cloud

watertreegirls.com

transportevolpara.com

shohagit.com

warna99.net

infsodex.online

fansjolt.com

ourrajasthan.com

secretgardenbuys.com

italyimportvinhos.com

gxzfwx.com

aujhgk.buzz

75313a.com

tertians.com

asansys.net

jacksonsportsmemorabilia.com

globalkamp305.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 47 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3148
    • C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe
      "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2964
      • C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe
        "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3672
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4512
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\RFQ_Brazil.exe"
        3⤵
          PID:2716

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/2964-17-0x0000000074620000-0x0000000074DD0000-memory.dmp

      Filesize

      7.7MB

    • memory/2964-0-0x00000000002F0000-0x000000000039A000-memory.dmp

      Filesize

      680KB

    • memory/2964-2-0x00000000053B0000-0x0000000005954000-memory.dmp

      Filesize

      5.6MB

    • memory/2964-3-0x0000000004E00000-0x0000000004E92000-memory.dmp

      Filesize

      584KB

    • memory/2964-4-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

      Filesize

      64KB

    • memory/2964-5-0x0000000004D90000-0x0000000004D9A000-memory.dmp

      Filesize

      40KB

    • memory/2964-6-0x0000000004FE0000-0x0000000005334000-memory.dmp

      Filesize

      3.3MB

    • memory/2964-7-0x0000000005A00000-0x0000000005A9C000-memory.dmp

      Filesize

      624KB

    • memory/2964-8-0x00000000059A0000-0x00000000059B2000-memory.dmp

      Filesize

      72KB

    • memory/2964-9-0x0000000006810000-0x0000000006832000-memory.dmp

      Filesize

      136KB

    • memory/2964-10-0x0000000006650000-0x0000000006668000-memory.dmp

      Filesize

      96KB

    • memory/2964-11-0x0000000074620000-0x0000000074DD0000-memory.dmp

      Filesize

      7.7MB

    • memory/2964-12-0x0000000004FD0000-0x0000000004FE0000-memory.dmp

      Filesize

      64KB

    • memory/2964-13-0x00000000090A0000-0x00000000090AA000-memory.dmp

      Filesize

      40KB

    • memory/2964-14-0x0000000009330000-0x000000000939E000-memory.dmp

      Filesize

      440KB

    • memory/2964-1-0x0000000074620000-0x0000000074DD0000-memory.dmp

      Filesize

      7.7MB

    • memory/3148-34-0x0000000008910000-0x0000000008A94000-memory.dmp

      Filesize

      1.5MB

    • memory/3148-45-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-75-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-74-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-22-0x00000000084B0000-0x000000000860C000-memory.dmp

      Filesize

      1.4MB

    • memory/3148-73-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-71-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-68-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-69-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-70-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-28-0x00000000084B0000-0x000000000860C000-memory.dmp

      Filesize

      1.4MB

    • memory/3148-67-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-31-0x0000000008910000-0x0000000008A94000-memory.dmp

      Filesize

      1.5MB

    • memory/3148-32-0x0000000008910000-0x0000000008A94000-memory.dmp

      Filesize

      1.5MB

    • memory/3148-66-0x0000000002270000-0x0000000002280000-memory.dmp

      Filesize

      64KB

    • memory/3148-38-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-39-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-40-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-42-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-43-0x0000000002260000-0x0000000002262000-memory.dmp

      Filesize

      8KB

    • memory/3148-47-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-46-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-49-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-65-0x0000000002260000-0x0000000002262000-memory.dmp

      Filesize

      8KB

    • memory/3148-44-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-41-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-52-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-53-0x0000000002270000-0x0000000002280000-memory.dmp

      Filesize

      64KB

    • memory/3148-54-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-51-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-50-0x0000000002270000-0x0000000002280000-memory.dmp

      Filesize

      64KB

    • memory/3148-55-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-57-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-59-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-61-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-64-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3148-63-0x0000000002240000-0x0000000002250000-memory.dmp

      Filesize

      64KB

    • memory/3672-18-0x0000000000E40000-0x000000000118A000-memory.dmp

      Filesize

      3.3MB

    • memory/3672-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/3672-21-0x0000000001340000-0x0000000001355000-memory.dmp

      Filesize

      84KB

    • memory/3672-20-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4512-30-0x0000000002980000-0x0000000002A14000-memory.dmp

      Filesize

      592KB

    • memory/4512-27-0x0000000000880000-0x00000000008AF000-memory.dmp

      Filesize

      188KB

    • memory/4512-26-0x0000000002C20000-0x0000000002F6A000-memory.dmp

      Filesize

      3.3MB

    • memory/4512-25-0x0000000000880000-0x00000000008AF000-memory.dmp

      Filesize

      188KB

    • memory/4512-24-0x00000000008E0000-0x0000000000937000-memory.dmp

      Filesize

      348KB

    • memory/4512-23-0x00000000008E0000-0x0000000000937000-memory.dmp

      Filesize

      348KB