Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    10/10/2023, 23:56

General

  • Target

    505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe

  • Size

    327KB

  • MD5

    625c3e1cb4694aeed2529c5a268e6f9f

  • SHA1

    67c6d10114c18242ac0dc4653b40ad86063ed18f

  • SHA256

    505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f

  • SHA512

    ca1ed7532e02f40a1f2198319dd2aee18616d631b7ff7070d4c3caa95d5e60c14bf80257cd20ded883ccd6c24c83f0da25b72c3b4a221628191e8babd50205e7

  • SSDEEP

    6144:/Ya6ftawQk/sEFeFtZrjBlplpAl8lmdWMQyTWaf8juupLGFberitGwXU8O:/YRtlQkjeFTPPWsmJQyTDXupLg5d5O

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

hph0

Decoy

sikisizlef.click

hottrendstore.com

aaroncordova.com

acemarketcommerce.com

connectdata.pro

wallerbrewery.com

kentos-nude.online

anlizhi.net

turismdelta.com

xgicloud.top

jahialo.com

warthercutlery.shop

wtlogryx.click

gbjyksm0czbki7.icu

sharmeventsplanner.com

plast.press

cyphersentinel.com

homes.credit

www11312011.com

rwalion.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 60 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3196
    • C:\Users\Admin\AppData\Local\Temp\505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe
      "C:\Users\Admin\AppData\Local\Temp\505ce37ae2ae28b9a50fe63eea5183dfe76b6f34c831a94b12a9e06365bba83f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3708
      • C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe
        "C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3192
        • C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe
          "C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1884
    • C:\Windows\SysWOW64\cmstp.exe
      "C:\Windows\SysWOW64\cmstp.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1080
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe"
        3⤵
          PID:1212

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe

      Filesize

      194KB

      MD5

      975e35f60d24ec8c1f08e2afd6878054

      SHA1

      a75b962a47b0ed82ca53db19e6821e3e62ae4f71

      SHA256

      2302d58ed71c9dddb624f8903d95af9ab2881cf65acff319980c40195c25c326

      SHA512

      3b969f89ed658e4ec3c1adb16b7564887985230021443e1124101c7a415ea401a4511203773240ee38cd23f62f4a3bb1d3e3f147f7eb68e33e6d31fd0c1dd6a0

    • C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe

      Filesize

      194KB

      MD5

      975e35f60d24ec8c1f08e2afd6878054

      SHA1

      a75b962a47b0ed82ca53db19e6821e3e62ae4f71

      SHA256

      2302d58ed71c9dddb624f8903d95af9ab2881cf65acff319980c40195c25c326

      SHA512

      3b969f89ed658e4ec3c1adb16b7564887985230021443e1124101c7a415ea401a4511203773240ee38cd23f62f4a3bb1d3e3f147f7eb68e33e6d31fd0c1dd6a0

    • C:\Users\Admin\AppData\Local\Temp\cmqhhyi.exe

      Filesize

      194KB

      MD5

      975e35f60d24ec8c1f08e2afd6878054

      SHA1

      a75b962a47b0ed82ca53db19e6821e3e62ae4f71

      SHA256

      2302d58ed71c9dddb624f8903d95af9ab2881cf65acff319980c40195c25c326

      SHA512

      3b969f89ed658e4ec3c1adb16b7564887985230021443e1124101c7a415ea401a4511203773240ee38cd23f62f4a3bb1d3e3f147f7eb68e33e6d31fd0c1dd6a0

    • C:\Users\Admin\AppData\Local\Temp\ybkgigxg.w

      Filesize

      205KB

      MD5

      be100c54c90efb0d588adeeb0281ede6

      SHA1

      01052c6a9a21bcd35803199fa79f6718504b9f41

      SHA256

      3e13db99ad23d260f99d10a28faeade5c7e0aa22a98275226980d33f1726f469

      SHA512

      542216be0796a4c40ae327b8ec01fb392ed7f887ab855e1edb8608fcf7b2a512a6a0d9247fc3f71512f7377c44d06cc2c9ddd2c1f7136d3976790643368625ec

    • memory/1080-18-0x0000000000870000-0x000000000089F000-memory.dmp

      Filesize

      188KB

    • memory/1080-20-0x0000000000870000-0x000000000089F000-memory.dmp

      Filesize

      188KB

    • memory/1080-22-0x0000000002620000-0x00000000026B4000-memory.dmp

      Filesize

      592KB

    • memory/1080-19-0x0000000002880000-0x0000000002BCA000-memory.dmp

      Filesize

      3.3MB

    • memory/1080-17-0x0000000000D60000-0x0000000000D76000-memory.dmp

      Filesize

      88KB

    • memory/1080-16-0x0000000000D60000-0x0000000000D76000-memory.dmp

      Filesize

      88KB

    • memory/1884-14-0x0000000000810000-0x0000000000825000-memory.dmp

      Filesize

      84KB

    • memory/1884-13-0x0000000000500000-0x000000000052F000-memory.dmp

      Filesize

      188KB

    • memory/1884-7-0x0000000000500000-0x000000000052F000-memory.dmp

      Filesize

      188KB

    • memory/1884-12-0x0000000000CE0000-0x000000000102A000-memory.dmp

      Filesize

      3.3MB

    • memory/3192-5-0x0000000000E70000-0x0000000000E72000-memory.dmp

      Filesize

      8KB

    • memory/3196-15-0x0000000008380000-0x000000000844A000-memory.dmp

      Filesize

      808KB

    • memory/3196-23-0x00000000088B0000-0x000000000898C000-memory.dmp

      Filesize

      880KB

    • memory/3196-24-0x00000000088B0000-0x000000000898C000-memory.dmp

      Filesize

      880KB

    • memory/3196-26-0x00000000088B0000-0x000000000898C000-memory.dmp

      Filesize

      880KB