Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-10-2023 20:16

General

  • Target

    SecuriteInfo.com.Win32.PWSX-gen.30247.exe

  • Size

    550KB

  • MD5

    5adbfe3a05eb61b2d2620b6538dc5772

  • SHA1

    8bee7a099e2c1753a62be196915da3756758e75c

  • SHA256

    d404e5865cddbf47f6a494f9120130035b3ac5761810dc75e20bc28873327547

  • SHA512

    5d66a876e199a1733c9c445cdb5d2c4d4842373a710c6a93c088d1d5456ef7c6a3308a56b1b00c5852457ec8db8108b1fe278f45b0dcc7b7433ea20b9e4a465c

  • SSDEEP

    12288:JZ725ZbHWLBajVyuexPgAHsP3o4roF6Btp3P:uCQSxPgAIogPBth

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

ey16

Decoy

slimshotonline.com

rifaboa.com

metallzauber.com

jabandfuel.com

reacthat.com

qcgaeu.top

ssongg446.cfd

29kuan7.cfd

101agh.com

reliablii.com

luginfinity.com

e513.cloud

k4lantar.sbs

etoempire.com

phons.info

vovacom.com

birbakalim.fun

wellhousesctx.com

flthg.link

strasburgangus.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 44 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.30247.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Win32.PWSX-gen.30247.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1976
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\gtpTbwW.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:4304
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\gtpTbwW" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5C63.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:444
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:4340
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3152
    • C:\Windows\SysWOW64\rundll32.exe
      "C:\Windows\SysWOW64\rundll32.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:1980

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_tv0e0swv.rwg.ps1

      Filesize

      60B

      MD5

      d17fe0a3f47be24a6453e9ef58c94641

      SHA1

      6ab83620379fc69f80c0242105ddffd7d98d5d9d

      SHA256

      96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

      SHA512

      5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

    • C:\Users\Admin\AppData\Local\Temp\tmp5C63.tmp

      Filesize

      1KB

      MD5

      7d91047b70919a2852db240cad8d4ecd

      SHA1

      de920e34c47408ac3445186c8e361e36631516a2

      SHA256

      f5e1e8faf01fa43d49162090f93750b7e1eede2f4cb23df7aaef1a4e503efcc6

      SHA512

      fe602723967d2de320cb3975276829c139d827e6fdc4e19174cb053a42e535195f40c3cf42a08aba1a29f5eaabc2643062aed162acdc41331b3f385e06d9cffd

    • memory/1976-6-0x0000000005A70000-0x0000000005A80000-memory.dmp

      Filesize

      64KB

    • memory/1976-3-0x0000000005800000-0x0000000005892000-memory.dmp

      Filesize

      584KB

    • memory/1976-4-0x00000000059B0000-0x00000000059C0000-memory.dmp

      Filesize

      64KB

    • memory/1976-5-0x00000000057F0000-0x00000000057FA000-memory.dmp

      Filesize

      40KB

    • memory/1976-24-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1976-7-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1976-8-0x00000000059B0000-0x00000000059C0000-memory.dmp

      Filesize

      64KB

    • memory/1976-9-0x0000000005AC0000-0x0000000005ACC000-memory.dmp

      Filesize

      48KB

    • memory/1976-10-0x0000000007210000-0x000000000727E000-memory.dmp

      Filesize

      440KB

    • memory/1976-11-0x0000000009870000-0x000000000990C000-memory.dmp

      Filesize

      624KB

    • memory/1976-0-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/1976-2-0x0000000005D10000-0x00000000062B4000-memory.dmp

      Filesize

      5.6MB

    • memory/1976-1-0x0000000000D70000-0x0000000000DFE000-memory.dmp

      Filesize

      568KB

    • memory/1992-78-0x0000000000C10000-0x0000000000C3F000-memory.dmp

      Filesize

      188KB

    • memory/1992-81-0x0000000002950000-0x00000000029E4000-memory.dmp

      Filesize

      592KB

    • memory/1992-69-0x0000000002AB0000-0x0000000002DFA000-memory.dmp

      Filesize

      3.3MB

    • memory/1992-63-0x0000000000C10000-0x0000000000C3F000-memory.dmp

      Filesize

      188KB

    • memory/1992-61-0x0000000000550000-0x0000000000564000-memory.dmp

      Filesize

      80KB

    • memory/1992-59-0x0000000000550000-0x0000000000564000-memory.dmp

      Filesize

      80KB

    • memory/3152-79-0x0000000008380000-0x00000000084FD000-memory.dmp

      Filesize

      1.5MB

    • memory/3152-42-0x0000000008380000-0x00000000084FD000-memory.dmp

      Filesize

      1.5MB

    • memory/3152-82-0x00000000028D0000-0x0000000002986000-memory.dmp

      Filesize

      728KB

    • memory/3152-83-0x00000000028D0000-0x0000000002986000-memory.dmp

      Filesize

      728KB

    • memory/3152-85-0x00000000028D0000-0x0000000002986000-memory.dmp

      Filesize

      728KB

    • memory/4304-43-0x0000000005BC0000-0x0000000005BDE000-memory.dmp

      Filesize

      120KB

    • memory/4304-67-0x0000000006F60000-0x0000000006F6A000-memory.dmp

      Filesize

      40KB

    • memory/4304-16-0x0000000002270000-0x00000000022A6000-memory.dmp

      Filesize

      216KB

    • memory/4304-17-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-44-0x0000000005C70000-0x0000000005CBC000-memory.dmp

      Filesize

      304KB

    • memory/4304-45-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/4304-46-0x00000000061A0000-0x00000000061D2000-memory.dmp

      Filesize

      200KB

    • memory/4304-47-0x00000000715C0000-0x000000007160C000-memory.dmp

      Filesize

      304KB

    • memory/4304-57-0x0000000006180000-0x000000000619E000-memory.dmp

      Filesize

      120KB

    • memory/4304-58-0x0000000006DA0000-0x0000000006E43000-memory.dmp

      Filesize

      652KB

    • memory/4304-37-0x00000000056D0000-0x0000000005A24000-memory.dmp

      Filesize

      3.3MB

    • memory/4304-27-0x0000000005560000-0x00000000055C6000-memory.dmp

      Filesize

      408KB

    • memory/4304-62-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-26-0x00000000054F0000-0x0000000005556000-memory.dmp

      Filesize

      408KB

    • memory/4304-66-0x0000000006EF0000-0x0000000006F0A000-memory.dmp

      Filesize

      104KB

    • memory/4304-65-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/4304-64-0x0000000007530000-0x0000000007BAA000-memory.dmp

      Filesize

      6.5MB

    • memory/4304-19-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/4304-68-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/4304-25-0x0000000004BF0000-0x0000000004C12000-memory.dmp

      Filesize

      136KB

    • memory/4304-70-0x0000000007170000-0x0000000007206000-memory.dmp

      Filesize

      600KB

    • memory/4304-71-0x00000000070F0000-0x0000000007101000-memory.dmp

      Filesize

      68KB

    • memory/4304-72-0x0000000007120000-0x000000000712E000-memory.dmp

      Filesize

      56KB

    • memory/4304-73-0x0000000007130000-0x0000000007144000-memory.dmp

      Filesize

      80KB

    • memory/4304-74-0x0000000007230000-0x000000000724A000-memory.dmp

      Filesize

      104KB

    • memory/4304-75-0x0000000007210000-0x0000000007218000-memory.dmp

      Filesize

      32KB

    • memory/4304-77-0x0000000074D00000-0x00000000754B0000-memory.dmp

      Filesize

      7.7MB

    • memory/4304-20-0x00000000022D0000-0x00000000022E0000-memory.dmp

      Filesize

      64KB

    • memory/4304-21-0x0000000004D90000-0x00000000053B8000-memory.dmp

      Filesize

      6.2MB

    • memory/4340-22-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4340-40-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/4340-38-0x0000000001580000-0x00000000018CA000-memory.dmp

      Filesize

      3.3MB

    • memory/4340-41-0x0000000001420000-0x0000000001435000-memory.dmp

      Filesize

      84KB