Analysis

  • max time kernel
    150s
  • max time network
    151s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    11/10/2023, 20:16

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.30247.exe

  • Size

    550KB

  • MD5

    5adbfe3a05eb61b2d2620b6538dc5772

  • SHA1

    8bee7a099e2c1753a62be196915da3756758e75c

  • SHA256

    d404e5865cddbf47f6a494f9120130035b3ac5761810dc75e20bc28873327547

  • SHA512

    5d66a876e199a1733c9c445cdb5d2c4d4842373a710c6a93c088d1d5456ef7c6a3308a56b1b00c5852457ec8db8108b1fe278f45b0dcc7b7433ea20b9e4a465c

  • SSDEEP

    12288:JZ725ZbHWLBajVyuexPgAHsP3o4roF6Btp3P:uCQSxPgAIogPBth

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ey16

Decoy

slimshotonline.com

rifaboa.com

metallzauber.com

jabandfuel.com

reacthat.com

qcgaeu.top

ssongg446.cfd

29kuan7.cfd

101agh.com

reliablii.com

luginfinity.com

e513.cloud

k4lantar.sbs

etoempire.com

phons.info

vovacom.com

birbakalim.fun

wellhousesctx.com

flthg.link

strasburgangus.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 5 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 23 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of WriteProcessMemory
    PID:1368
    • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.30247.exe
      "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.30247.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gtpTbwW.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1288
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gtpTbwW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp73F8.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2892
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:1960
    • C:\Windows\SysWOW64\NAPSTAT.EXE
      "C:\Windows\SysWOW64\NAPSTAT.EXE"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:2648

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\tmp73F8.tmp

      Filesize

      1KB

      MD5

      c6099c9d97cfc330b59aaf60227f00dc

      SHA1

      08de91853d673f64c2865a65cb3434b9fde1ed17

      SHA256

      257318a25e9a09d31171b620cb0ff842ebe530ee847bda9fe9401d6896c91ea5

      SHA512

      be109271e022f759567f70e45f172290cbd1f9b05bd93fb2ac1dab9d21fe9085e9b5d47c074df5ad6871bdb2e8acd55168307d145f57c6057dbcb72dd1391f6d

    • memory/1288-30-0x00000000024E0000-0x0000000002520000-memory.dmp

      Filesize

      256KB

    • memory/1288-29-0x00000000024E0000-0x0000000002520000-memory.dmp

      Filesize

      256KB

    • memory/1288-24-0x000000006E640000-0x000000006EBEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1288-23-0x000000006E640000-0x000000006EBEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1288-28-0x00000000024E0000-0x0000000002520000-memory.dmp

      Filesize

      256KB

    • memory/1288-40-0x00000000024E0000-0x0000000002520000-memory.dmp

      Filesize

      256KB

    • memory/1288-46-0x000000006E640000-0x000000006EBEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1288-39-0x00000000024E0000-0x0000000002520000-memory.dmp

      Filesize

      256KB

    • memory/1288-36-0x000000006E640000-0x000000006EBEB000-memory.dmp

      Filesize

      5.7MB

    • memory/1368-32-0x000007FF2B920000-0x000007FF2B92A000-memory.dmp

      Filesize

      40KB

    • memory/1368-31-0x000007FEF5450000-0x000007FEF5593000-memory.dmp

      Filesize

      1.3MB

    • memory/1368-27-0x00000000069E0000-0x0000000006B10000-memory.dmp

      Filesize

      1.2MB

    • memory/1368-48-0x0000000006CA0000-0x0000000006D5E000-memory.dmp

      Filesize

      760KB

    • memory/1368-42-0x0000000002D80000-0x0000000002E80000-memory.dmp

      Filesize

      1024KB

    • memory/1368-44-0x0000000006CA0000-0x0000000006D5E000-memory.dmp

      Filesize

      760KB

    • memory/1368-45-0x0000000006CA0000-0x0000000006D5E000-memory.dmp

      Filesize

      760KB

    • memory/1960-25-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1960-15-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1960-26-0x0000000000150000-0x0000000000165000-memory.dmp

      Filesize

      84KB

    • memory/1960-21-0x00000000009E0000-0x0000000000CE3000-memory.dmp

      Filesize

      3.0MB

    • memory/1960-16-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1960-19-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1960-17-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/2596-38-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2596-33-0x00000000000B0000-0x00000000000F6000-memory.dmp

      Filesize

      280KB

    • memory/2596-34-0x00000000000B0000-0x00000000000F6000-memory.dmp

      Filesize

      280KB

    • memory/2596-35-0x0000000000080000-0x00000000000AF000-memory.dmp

      Filesize

      188KB

    • memory/2596-43-0x00000000007C0000-0x0000000000854000-memory.dmp

      Filesize

      592KB

    • memory/2596-37-0x0000000001E80000-0x0000000002183000-memory.dmp

      Filesize

      3.0MB

    • memory/3052-0-0x00000000741B0000-0x000000007489E000-memory.dmp

      Filesize

      6.9MB

    • memory/3052-6-0x00000000004F0000-0x00000000004FC000-memory.dmp

      Filesize

      48KB

    • memory/3052-20-0x00000000741B0000-0x000000007489E000-memory.dmp

      Filesize

      6.9MB

    • memory/3052-5-0x0000000004DB0000-0x0000000004DF0000-memory.dmp

      Filesize

      256KB

    • memory/3052-7-0x00000000051A0000-0x000000000520E000-memory.dmp

      Filesize

      440KB

    • memory/3052-4-0x00000000741B0000-0x000000007489E000-memory.dmp

      Filesize

      6.9MB

    • memory/3052-3-0x00000000004D0000-0x00000000004E0000-memory.dmp

      Filesize

      64KB

    • memory/3052-2-0x0000000004DB0000-0x0000000004DF0000-memory.dmp

      Filesize

      256KB

    • memory/3052-1-0x00000000001B0000-0x000000000023E000-memory.dmp

      Filesize

      568KB