Analysis

  • max time kernel
    150s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231020-en
  • resource tags

    arch:x64arch:x86image:win7-20231020-enlocale:en-usos:windows7-x64system
  • submitted
    24/10/2023, 00:43

General

  • Target

    P.O 2.rtf

  • Size

    93KB

  • MD5

    4e3b9b06dc44119372a0dfc65322496b

  • SHA1

    25c6730b491be95674ab3150c84068a39937dafc

  • SHA256

    a5d83f25c675104454de24fe6452127f1e655ebb655a3a8fd5a0d4d057007e51

  • SHA512

    b8dd3a1d4fc74941abec997055f9eac4fca91d40b944072809cdb58192931bb1259acbd7a2c6b82ff64ea730804dcc2ae28a8c22b75e6ec785ac4babac215d45

  • SSDEEP

    768:HwAbZSibMX9gRWjUNmsed3ACGvG9WSRjZzgIOw//Nq6dSAMw:HwAlR0sq3A5GgCDOw/06Cw

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

oy30

Decoy

rfc234.top

danielcavalari.com

elperegrinocabo.com

aryor.info

surelistening.com

premium-numero-telf.buzz

orlynyml.click

tennislovers-ro.com

holdmytracker.com

eewapay.com

jaimesinstallglass.com

damactrade.net

swapspecialities.com

perfumesrffd.today

salesfactory.pro

supportive-solutions.com

naiol.com

khoyr.com

kalendeargpt44.com

web-tech-spb.store

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Blocklisted process makes network request 1 IoCs
  • Downloads MZ/PE file
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Drops file in Windows directory 1 IoCs
  • Office loads VBA resources, possible macro or embedded object present
  • Launches Equation Editor 1 TTPs 1 IoCs

    Equation Editor is an old Office component often targeted by exploits such as CVE-2017-11882.

  • Modifies Internet Explorer settings 1 TTPs 31 IoCs
  • Modifies registry class 64 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    PID:1248
    • C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\P.O 2.rtf"
      2⤵
      • Drops file in Windows directory
      • Modifies Internet Explorer settings
      • Modifies registry class
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2220
      • C:\Windows\splwow64.exe
        C:\Windows\splwow64.exe 12288
        3⤵
          PID:2576
    • C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE
      "C:\Program Files (x86)\Common Files\Microsoft Shared\EQUATION\EQNEDT32.EXE" -Embedding
      1⤵
      • Blocklisted process makes network request
      • Loads dropped DLL
      • Launches Equation Editor
      • Suspicious use of WriteProcessMemory
      PID:2288
      • C:\Users\Admin\AppData\Roaming\obid5732.exe
        "C:\Users\Admin\AppData\Roaming\obid5732.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:3008
        • C:\Users\Admin\AppData\Roaming\obid5732.exe
          "C:\Users\Admin\AppData\Roaming\obid5732.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1060

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Microsoft\Templates\Normal.dotm

      Filesize

      20KB

      MD5

      82ea1eb36632b0b4cadca6a54497cb00

      SHA1

      239686d468f89718f02926330c669cf6e6fdb66e

      SHA256

      689c1ee35284e037aff130dec94e2075d951c371c2b862074af2928ea5947330

      SHA512

      1e289bcc050321a545de64a4e3c38a24a8b5203ca03d67d70584e1159b24b94778e525ecaadf70eb17364cb36907d3c72114cdfb037d524b7f21043138b9d85e

    • C:\Users\Admin\AppData\Roaming\obid5732.exe

      Filesize

      676KB

      MD5

      078145e739672f6cb7103e68005a5bee

      SHA1

      7aefac56a0d62f358ab44048e2be82898559c7aa

      SHA256

      a4c0d57544223406171313e236825d0156eeb6198b07a3606b5ed6582915ba39

      SHA512

      e05246bbe5d86e13d57d4f00f16756a494707c077321df1d28ecd4e499e45514c3141c647937004c7ed9abed59fee1f8874f36033dbab5dae4545f814652414a

    • C:\Users\Admin\AppData\Roaming\obid5732.exe

      Filesize

      676KB

      MD5

      078145e739672f6cb7103e68005a5bee

      SHA1

      7aefac56a0d62f358ab44048e2be82898559c7aa

      SHA256

      a4c0d57544223406171313e236825d0156eeb6198b07a3606b5ed6582915ba39

      SHA512

      e05246bbe5d86e13d57d4f00f16756a494707c077321df1d28ecd4e499e45514c3141c647937004c7ed9abed59fee1f8874f36033dbab5dae4545f814652414a

    • C:\Users\Admin\AppData\Roaming\obid5732.exe

      Filesize

      676KB

      MD5

      078145e739672f6cb7103e68005a5bee

      SHA1

      7aefac56a0d62f358ab44048e2be82898559c7aa

      SHA256

      a4c0d57544223406171313e236825d0156eeb6198b07a3606b5ed6582915ba39

      SHA512

      e05246bbe5d86e13d57d4f00f16756a494707c077321df1d28ecd4e499e45514c3141c647937004c7ed9abed59fee1f8874f36033dbab5dae4545f814652414a

    • C:\Users\Admin\AppData\Roaming\obid5732.exe

      Filesize

      676KB

      MD5

      078145e739672f6cb7103e68005a5bee

      SHA1

      7aefac56a0d62f358ab44048e2be82898559c7aa

      SHA256

      a4c0d57544223406171313e236825d0156eeb6198b07a3606b5ed6582915ba39

      SHA512

      e05246bbe5d86e13d57d4f00f16756a494707c077321df1d28ecd4e499e45514c3141c647937004c7ed9abed59fee1f8874f36033dbab5dae4545f814652414a

    • \Users\Admin\AppData\Roaming\obid5732.exe

      Filesize

      676KB

      MD5

      078145e739672f6cb7103e68005a5bee

      SHA1

      7aefac56a0d62f358ab44048e2be82898559c7aa

      SHA256

      a4c0d57544223406171313e236825d0156eeb6198b07a3606b5ed6582915ba39

      SHA512

      e05246bbe5d86e13d57d4f00f16756a494707c077321df1d28ecd4e499e45514c3141c647937004c7ed9abed59fee1f8874f36033dbab5dae4545f814652414a

    • memory/1060-31-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1060-32-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

      Filesize

      4KB

    • memory/1060-39-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1060-37-0x0000000000810000-0x0000000000B13000-memory.dmp

      Filesize

      3.0MB

    • memory/1060-34-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1060-40-0x0000000000290000-0x00000000002A5000-memory.dmp

      Filesize

      84KB

    • memory/1060-30-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1060-43-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1060-44-0x00000000002E0000-0x00000000002F5000-memory.dmp

      Filesize

      84KB

    • memory/1248-45-0x0000000006C70000-0x0000000006D75000-memory.dmp

      Filesize

      1.0MB

    • memory/1248-46-0x0000000006F20000-0x0000000006FDA000-memory.dmp

      Filesize

      744KB

    • memory/1248-47-0x0000000006F20000-0x0000000006FDA000-memory.dmp

      Filesize

      744KB

    • memory/1248-41-0x0000000006C70000-0x0000000006D75000-memory.dmp

      Filesize

      1.0MB

    • memory/2220-24-0x00000000712ED000-0x00000000712F8000-memory.dmp

      Filesize

      44KB

    • memory/2220-66-0x00000000712ED000-0x00000000712F8000-memory.dmp

      Filesize

      44KB

    • memory/2220-2-0x00000000712ED000-0x00000000712F8000-memory.dmp

      Filesize

      44KB

    • memory/2220-1-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2220-65-0x000000005FFF0000-0x0000000060000000-memory.dmp

      Filesize

      64KB

    • memory/2220-0-0x000000002FD41000-0x000000002FD42000-memory.dmp

      Filesize

      4KB

    • memory/3008-16-0x000000006B4A0000-0x000000006BB8E000-memory.dmp

      Filesize

      6.9MB

    • memory/3008-36-0x000000006B4A0000-0x000000006BB8E000-memory.dmp

      Filesize

      6.9MB

    • memory/3008-29-0x0000000005BC0000-0x0000000005C2E000-memory.dmp

      Filesize

      440KB

    • memory/3008-28-0x0000000000360000-0x0000000000370000-memory.dmp

      Filesize

      64KB

    • memory/3008-26-0x0000000000BB0000-0x0000000000BF0000-memory.dmp

      Filesize

      256KB

    • memory/3008-25-0x000000006B4A0000-0x000000006BB8E000-memory.dmp

      Filesize

      6.9MB

    • memory/3008-23-0x0000000000310000-0x000000000031C000-memory.dmp

      Filesize

      48KB

    • memory/3008-22-0x0000000000330000-0x000000000034C000-memory.dmp

      Filesize

      112KB

    • memory/3008-17-0x0000000000BB0000-0x0000000000BF0000-memory.dmp

      Filesize

      256KB

    • memory/3008-15-0x00000000010A0000-0x0000000001150000-memory.dmp

      Filesize

      704KB