Analysis

  • max time kernel
    146s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    21/09/2023, 09:40

General

  • Target

    PO 2344(ES2309-015).xls

  • Size

    1.1MB

  • MD5

    a07fc73d08d1cf4779e3ea62998b7b9b

  • SHA1

    9152263de49c761a5652c4a4daaaccf27af9bb80

  • SHA256

    4fbd9aad2f65cd5e6f0c4df01566cfef74f9a6209d44ed0ba9e7cd8c04ff034f

  • SHA512

    556e12c3cf9bf0df79b11090f265446275db92e758d69c73e44cf2358f5600c681235197964a801cb9c5baf152161470d9a1e47c9a15a64311bdc881484ad2c1

  • SSDEEP

    24576:EWQmmav30xSZy6w6Va6N+yZyew6VC6N3qBR0lQ0TIB0T1qJ6H3Sw0D:ZQmmQ306+6V/tK6V3EYl7TBTe6HC3

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sy22

Decoy

vinteligencia.com

displayfridges.fun

completetip.com

giallozafferrano.com

jizihao1.com

mysticheightstrail.com

fourseasonslb.com

kjnala.shop

mosiacwall.com

vandistreet.com

gracefullytouchedartistry.com

hbiwhwr.shop

mfmz.net

hrmbrillianz.com

funwarsztat.com

polewithcandy.com

ourrajasthan.com

wilhouettteamerica.com

johnnystintshop.com

asgnelwin.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 29 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1180
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\PO 2344(ES2309-015).xls"
      2⤵
      • Enumerates system info in registry
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2364
    • C:\Windows\SysWOW64\wlanext.exe
      "C:\Windows\SysWOW64\wlanext.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe"
        3⤵
          PID:2888
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2640
      • C:\Users\Admin\AppData\Roaming\TiWorker.exe
        "C:\Users\Admin\AppData\Roaming\TiWorker.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe
          "C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetThreadContext
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe
            "C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe"
            4⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2540

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\jlcsz.t

      Filesize

      205KB

      MD5

      196fb7e1e9c8fdae48112489a24d4ad3

      SHA1

      335502082c0eb99668c515f04823baeef6fc6064

      SHA256

      bdc440c03c351c2e8a7e5115724a90292754eb7b533924aa02b22d2d37bb9fb6

      SHA512

      02cf78c6a1bdabeb654f00be67cf620a65a3e540a813112ff4e352ab5e8ae80545fc5939e9ab82f10b0da812601f911d1743504dfb264c6023f83e75847301d3

    • C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe

      Filesize

      150KB

      MD5

      46b193d5f704cd1a0aadb11ee569797e

      SHA1

      7cd6f0a405361111a11935961a8e7d8e12c425c9

      SHA256

      c3bca399df18104cf411227ac1e92f422ed40ee71c43764d452a514c718fa2f4

      SHA512

      ad02f8412175103031ace01ed3fd2c6694c0e8d39ae45e10b067dd1cff3ee709a741613522eb208e32ea6cadb79ff55e22c68ed46673acfd66808e1141b61c6c

    • C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe

      Filesize

      150KB

      MD5

      46b193d5f704cd1a0aadb11ee569797e

      SHA1

      7cd6f0a405361111a11935961a8e7d8e12c425c9

      SHA256

      c3bca399df18104cf411227ac1e92f422ed40ee71c43764d452a514c718fa2f4

      SHA512

      ad02f8412175103031ace01ed3fd2c6694c0e8d39ae45e10b067dd1cff3ee709a741613522eb208e32ea6cadb79ff55e22c68ed46673acfd66808e1141b61c6c

    • C:\Users\Admin\AppData\Local\Temp\wirybscjwh.exe

      Filesize

      150KB

      MD5

      46b193d5f704cd1a0aadb11ee569797e

      SHA1

      7cd6f0a405361111a11935961a8e7d8e12c425c9

      SHA256

      c3bca399df18104cf411227ac1e92f422ed40ee71c43764d452a514c718fa2f4

      SHA512

      ad02f8412175103031ace01ed3fd2c6694c0e8d39ae45e10b067dd1cff3ee709a741613522eb208e32ea6cadb79ff55e22c68ed46673acfd66808e1141b61c6c

    • C:\Users\Admin\AppData\Roaming\TiWorker.exe

      Filesize

      298KB

      MD5

      b51f67297d5dd494ed1acecf85c989f8

      SHA1

      3b0bb6fab8077c13633b9cdab84a42d981fb59b5

      SHA256

      c121eae871db09a878d790146f551a88f652fa3c0b56627674dc5ba9f05e04bc

      SHA512

      14de097c176e7c7b8626f6a514d7969cde26009612517ef5dc25f85ad583d4093f0cddc80a7502f2471850461caffccbffa76228ed4fe8278b08f5fe2013f157

    • C:\Users\Admin\AppData\Roaming\TiWorker.exe

      Filesize

      298KB

      MD5

      b51f67297d5dd494ed1acecf85c989f8

      SHA1

      3b0bb6fab8077c13633b9cdab84a42d981fb59b5

      SHA256

      c121eae871db09a878d790146f551a88f652fa3c0b56627674dc5ba9f05e04bc

      SHA512

      14de097c176e7c7b8626f6a514d7969cde26009612517ef5dc25f85ad583d4093f0cddc80a7502f2471850461caffccbffa76228ed4fe8278b08f5fe2013f157

    • C:\Users\Admin\AppData\Roaming\TiWorker.exe

      Filesize

      298KB

      MD5

      b51f67297d5dd494ed1acecf85c989f8

      SHA1

      3b0bb6fab8077c13633b9cdab84a42d981fb59b5

      SHA256

      c121eae871db09a878d790146f551a88f652fa3c0b56627674dc5ba9f05e04bc

      SHA512

      14de097c176e7c7b8626f6a514d7969cde26009612517ef5dc25f85ad583d4093f0cddc80a7502f2471850461caffccbffa76228ed4fe8278b08f5fe2013f157

    • \Users\Admin\AppData\Local\Temp\wirybscjwh.exe

      Filesize

      150KB

      MD5

      46b193d5f704cd1a0aadb11ee569797e

      SHA1

      7cd6f0a405361111a11935961a8e7d8e12c425c9

      SHA256

      c3bca399df18104cf411227ac1e92f422ed40ee71c43764d452a514c718fa2f4

      SHA512

      ad02f8412175103031ace01ed3fd2c6694c0e8d39ae45e10b067dd1cff3ee709a741613522eb208e32ea6cadb79ff55e22c68ed46673acfd66808e1141b61c6c

    • \Users\Admin\AppData\Local\Temp\wirybscjwh.exe

      Filesize

      150KB

      MD5

      46b193d5f704cd1a0aadb11ee569797e

      SHA1

      7cd6f0a405361111a11935961a8e7d8e12c425c9

      SHA256

      c3bca399df18104cf411227ac1e92f422ed40ee71c43764d452a514c718fa2f4

      SHA512

      ad02f8412175103031ace01ed3fd2c6694c0e8d39ae45e10b067dd1cff3ee709a741613522eb208e32ea6cadb79ff55e22c68ed46673acfd66808e1141b61c6c

    • \Users\Admin\AppData\Roaming\TiWorker.exe

      Filesize

      298KB

      MD5

      b51f67297d5dd494ed1acecf85c989f8

      SHA1

      3b0bb6fab8077c13633b9cdab84a42d981fb59b5

      SHA256

      c121eae871db09a878d790146f551a88f652fa3c0b56627674dc5ba9f05e04bc

      SHA512

      14de097c176e7c7b8626f6a514d7969cde26009612517ef5dc25f85ad583d4093f0cddc80a7502f2471850461caffccbffa76228ed4fe8278b08f5fe2013f157

    • memory/1180-36-0x0000000004C70000-0x0000000004D7D000-memory.dmp

      Filesize

      1.1MB

    • memory/1180-53-0x0000000006F60000-0x000000000707E000-memory.dmp

      Filesize

      1.1MB

    • memory/1180-55-0x0000000006F60000-0x000000000707E000-memory.dmp

      Filesize

      1.1MB

    • memory/1180-42-0x0000000004E90000-0x0000000004F52000-memory.dmp

      Filesize

      776KB

    • memory/1180-34-0x0000000000120000-0x0000000000220000-memory.dmp

      Filesize

      1024KB

    • memory/1180-52-0x0000000006F60000-0x000000000707E000-memory.dmp

      Filesize

      1.1MB

    • memory/2364-37-0x000000007270D000-0x0000000072718000-memory.dmp

      Filesize

      44KB

    • memory/2364-1-0x000000007270D000-0x0000000072718000-memory.dmp

      Filesize

      44KB

    • memory/2364-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2540-31-0x0000000000770000-0x0000000000A73000-memory.dmp

      Filesize

      3.0MB

    • memory/2540-40-0x00000000004A0000-0x00000000004B4000-memory.dmp

      Filesize

      80KB

    • memory/2540-39-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2540-35-0x00000000003B0000-0x00000000003C4000-memory.dmp

      Filesize

      80KB

    • memory/2540-33-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2540-28-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2544-24-0x0000000000260000-0x0000000000262000-memory.dmp

      Filesize

      8KB

    • memory/2796-46-0x0000000001EE0000-0x00000000021E3000-memory.dmp

      Filesize

      3.0MB

    • memory/2796-47-0x00000000000C0000-0x00000000000EF000-memory.dmp

      Filesize

      188KB

    • memory/2796-49-0x0000000001D50000-0x0000000001DE3000-memory.dmp

      Filesize

      588KB

    • memory/2796-45-0x00000000000C0000-0x00000000000EF000-memory.dmp

      Filesize

      188KB

    • memory/2796-44-0x0000000000930000-0x0000000000946000-memory.dmp

      Filesize

      88KB

    • memory/2796-43-0x0000000000930000-0x0000000000946000-memory.dmp

      Filesize

      88KB