Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    06/10/2023, 12:38

General

  • Target

    SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe

  • Size

    576KB

  • MD5

    1bebb72d1e9e14fe496ac6a0f248cccb

  • SHA1

    97dc0a02f236b714db99227fd4565a40b08fc136

  • SHA256

    851bc963ff7f1029f7495c537b2c4a34552dd60750e334cfaf237da398e6ea67

  • SHA512

    e1353768e9591bad18776b1c56ce83fd6f1417e32421e64eda67a92e5e92fc4fa0f09a87eb9162412a70565b59309ab4c9220d1ac052feefc8a1e5d6d23e5a21

  • SSDEEP

    12288:B/jNL4j/JuOst2aLW9PdMAn/bZibbNDxCWbV6YWEcI:BLNLU/UOUcZ/YxcW

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ey16

Decoy

slimshotonline.com

rifaboa.com

metallzauber.com

jabandfuel.com

reacthat.com

qcgaeu.top

ssongg446.cfd

29kuan7.cfd

101agh.com

reliablii.com

luginfinity.com

e513.cloud

k4lantar.sbs

etoempire.com

phons.info

vovacom.com

birbakalim.fun

wellhousesctx.com

flthg.link

strasburgangus.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of WriteProcessMemory
    PID:1280
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.PackedNET.2430.18308.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:1636
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\ktImVdmWg.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:2748
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\ktImVdmWg" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2660
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:2560
    • C:\Windows\SysWOW64\NETSTAT.EXE
      "C:\Windows\SysWOW64\NETSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Gathers network information
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2860
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:3024

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmpD394.tmp

      Filesize

      1KB

      MD5

      e819ac90edd53b48d2d9093e1ff6fe4c

      SHA1

      9edd9d6c061c34f8cee8724ccc577067b4bfed56

      SHA256

      0f914334f5965d8ec4b4f0c8bda97133788116ff530dc6aa78dccf3be0fa0644

      SHA512

      b758dc8ae943a58e3e0723292ec9af4704288a3ebc6343d3938d444b8b2e43008995ab7b1370df4852170400d873a4816c566d5e59f982f63a190d188a4771f8

    • memory/1280-42-0x0000000000010000-0x0000000000020000-memory.dmp

      Filesize

      64KB

    • memory/1280-43-0x00000000048B0000-0x0000000004952000-memory.dmp

      Filesize

      648KB

    • memory/1280-31-0x0000000003940000-0x0000000003A40000-memory.dmp

      Filesize

      1024KB

    • memory/1280-32-0x00000000071F0000-0x000000000731B000-memory.dmp

      Filesize

      1.2MB

    • memory/1280-40-0x00000000071F0000-0x000000000731B000-memory.dmp

      Filesize

      1.2MB

    • memory/1280-47-0x00000000048B0000-0x0000000004952000-memory.dmp

      Filesize

      648KB

    • memory/1280-45-0x00000000048B0000-0x0000000004952000-memory.dmp

      Filesize

      648KB

    • memory/1636-2-0x0000000004DC0000-0x0000000004E00000-memory.dmp

      Filesize

      256KB

    • memory/1636-6-0x0000000000380000-0x0000000000390000-memory.dmp

      Filesize

      64KB

    • memory/1636-1-0x0000000074CD0000-0x00000000753BE000-memory.dmp

      Filesize

      6.9MB

    • memory/1636-7-0x0000000005010000-0x000000000507E000-memory.dmp

      Filesize

      440KB

    • memory/1636-0-0x0000000000C20000-0x0000000000CB6000-memory.dmp

      Filesize

      600KB

    • memory/1636-22-0x0000000074CD0000-0x00000000753BE000-memory.dmp

      Filesize

      6.9MB

    • memory/1636-5-0x0000000004DC0000-0x0000000004E00000-memory.dmp

      Filesize

      256KB

    • memory/1636-4-0x0000000074CD0000-0x00000000753BE000-memory.dmp

      Filesize

      6.9MB

    • memory/1636-3-0x0000000000600000-0x0000000000618000-memory.dmp

      Filesize

      96KB

    • memory/2560-28-0x00000000009A0000-0x0000000000CA3000-memory.dmp

      Filesize

      3.0MB

    • memory/2560-21-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2560-29-0x00000000002E0000-0x00000000002F5000-memory.dmp

      Filesize

      84KB

    • memory/2560-17-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2560-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2560-30-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/2560-19-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2748-23-0x000000006F130000-0x000000006F6DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2748-26-0x0000000002330000-0x0000000002370000-memory.dmp

      Filesize

      256KB

    • memory/2748-34-0x000000006F130000-0x000000006F6DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2748-33-0x0000000002330000-0x0000000002370000-memory.dmp

      Filesize

      256KB

    • memory/2748-24-0x000000006F130000-0x000000006F6DB000-memory.dmp

      Filesize

      5.7MB

    • memory/2748-25-0x0000000002330000-0x0000000002370000-memory.dmp

      Filesize

      256KB

    • memory/2860-35-0x0000000000EF0000-0x0000000000EF9000-memory.dmp

      Filesize

      36KB

    • memory/2860-36-0x0000000000EF0000-0x0000000000EF9000-memory.dmp

      Filesize

      36KB

    • memory/2860-37-0x00000000000D0000-0x00000000000FF000-memory.dmp

      Filesize

      188KB

    • memory/2860-38-0x0000000002300000-0x0000000002603000-memory.dmp

      Filesize

      3.0MB

    • memory/2860-39-0x00000000000D0000-0x00000000000FF000-memory.dmp

      Filesize

      188KB

    • memory/2860-41-0x0000000000A50000-0x0000000000AE4000-memory.dmp

      Filesize

      592KB