Analysis

  • max time kernel
    153s
  • max time network
    160s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19-09-2023 10:38

General

  • Target

    tmp.exe

  • Size

    710KB

  • MD5

    493562fc3240d634f797be4a433d72c7

  • SHA1

    92569595aa0a20d9937bd03525a756dd35059d3b

  • SHA256

    6b73ab2cf730e26c8609e57d23e09260d6c74db84f29ae6f786129f7a3b6512b

  • SHA512

    70eb16d06d38d80cc4513962f6fbdeda54e6ec2bc30caa9fb112d3cd355b12c088426c823d3d4a3e315209b3fc908c0339e9cdc8de99462e87eba311f4801a75

  • SSDEEP

    12288:406gna2iNP1UIkvEbtOgVt3KB6bxxXRZEG/p8fD5mcjtqlg6utz5l96OXaq:XTa1F14ot1aIxxAop+mc0g6MNa

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ro12

Decoy

start399.com

decyfincoin.com

binguozhijiaok.com

one45.vip

55dy5s.top

regmt.pro

2ahxgaafifl.com

xn--6rtp2flvfc2h.com

justinmburns.com

los3.online

fleshaaikensdivinegiven7llc.com

servicedelv.services

apexcaryhomesforsale.com

shuraop.xyz

sagetotal.com

gratitude-et-compagnie.com

riderarea.com

digitalserviceact.online

contentbyc.com

agenda-digital-planner.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 48 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 7 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3136
    • C:\Users\Admin\AppData\Local\Temp\tmp.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2540
      • C:\Users\Admin\AppData\Local\Temp\tmp.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1432
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
        3⤵
          PID:4428

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1432-12-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1432-15-0x0000000001680000-0x00000000019CA000-memory.dmp

      Filesize

      3.3MB

    • memory/1432-18-0x0000000001660000-0x0000000001674000-memory.dmp

      Filesize

      80KB

    • memory/1432-17-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2540-6-0x00000000058C0000-0x00000000058D8000-memory.dmp

      Filesize

      96KB

    • memory/2540-9-0x00000000058F0000-0x00000000058FA000-memory.dmp

      Filesize

      40KB

    • memory/2540-2-0x0000000005900000-0x0000000005EA4000-memory.dmp

      Filesize

      5.6MB

    • memory/2540-3-0x0000000005430000-0x00000000054C2000-memory.dmp

      Filesize

      584KB

    • memory/2540-4-0x00000000056A0000-0x00000000056B0000-memory.dmp

      Filesize

      64KB

    • memory/2540-5-0x00000000055D0000-0x00000000055DA000-memory.dmp

      Filesize

      40KB

    • memory/2540-0-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB

    • memory/2540-7-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB

    • memory/2540-8-0x00000000056A0000-0x00000000056B0000-memory.dmp

      Filesize

      64KB

    • memory/2540-1-0x0000000000970000-0x0000000000A28000-memory.dmp

      Filesize

      736KB

    • memory/2540-10-0x000000000A3B0000-0x000000000A41E000-memory.dmp

      Filesize

      440KB

    • memory/2540-11-0x000000000D4C0000-0x000000000D55C000-memory.dmp

      Filesize

      624KB

    • memory/2540-14-0x0000000074990000-0x0000000075140000-memory.dmp

      Filesize

      7.7MB

    • memory/2640-20-0x00000000009B0000-0x00000000009BB000-memory.dmp

      Filesize

      44KB

    • memory/2640-21-0x00000000009B0000-0x00000000009BB000-memory.dmp

      Filesize

      44KB

    • memory/2640-22-0x0000000001030000-0x000000000105F000-memory.dmp

      Filesize

      188KB

    • memory/2640-23-0x00000000017D0000-0x0000000001B1A000-memory.dmp

      Filesize

      3.3MB

    • memory/2640-24-0x0000000001030000-0x000000000105F000-memory.dmp

      Filesize

      188KB

    • memory/2640-27-0x00000000016F0000-0x0000000001783000-memory.dmp

      Filesize

      588KB

    • memory/3136-36-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-51-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-28-0x0000000008290000-0x0000000008358000-memory.dmp

      Filesize

      800KB

    • memory/3136-29-0x0000000008290000-0x0000000008358000-memory.dmp

      Filesize

      800KB

    • memory/3136-31-0x0000000008290000-0x0000000008358000-memory.dmp

      Filesize

      800KB

    • memory/3136-35-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-37-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-19-0x0000000007930000-0x0000000007AAC000-memory.dmp

      Filesize

      1.5MB

    • memory/3136-40-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-39-0x0000000000930000-0x0000000000932000-memory.dmp

      Filesize

      8KB

    • memory/3136-38-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-41-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-42-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-46-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-44-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-47-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-48-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3136-49-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-50-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-25-0x0000000007930000-0x0000000007AAC000-memory.dmp

      Filesize

      1.5MB

    • memory/3136-53-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-57-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-55-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-54-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-56-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-60-0x0000000000930000-0x0000000000932000-memory.dmp

      Filesize

      8KB

    • memory/3136-61-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-59-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-62-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-63-0x00000000027B0000-0x00000000027C0000-memory.dmp

      Filesize

      64KB

    • memory/3136-64-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-66-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-65-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-69-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-71-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-70-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB

    • memory/3136-72-0x00000000008D0000-0x00000000008E0000-memory.dmp

      Filesize

      64KB