Analysis

  • max time kernel
    157s
  • max time network
    153s
  • platform
    windows10-1703_x64
  • resource
    win10-20231020-en
  • resource tags

    arch:x64arch:x86image:win10-20231020-enlocale:en-usos:windows10-1703-x64system
  • submitted
    02-11-2023 01:49

General

  • Target

    014ed741b83b7bd4572f9fb1285ebecf658b74eb367b712614034c28b9af4845.exe

  • Size

    361KB

  • MD5

    5670f0e7e08a909949216672d3428e66

  • SHA1

    8c8e8e7715e87810ad4d1f943279e081b7fded0e

  • SHA256

    014ed741b83b7bd4572f9fb1285ebecf658b74eb367b712614034c28b9af4845

  • SHA512

    ac8ecdffd2991dbcde5eb86eb3525c40c4f1be468c22f03826c39228594764c2e38a7f82ce75537a8e3400d0dc68d674303c51a7ad424fca08c807898e70c28e

  • SSDEEP

    6144:F8LxBspf+q388vnDdsnm0GJPldFNehNTZGbQvtovLZIXahPxCpO2yjP2k5:/p9Dxsm0GJPRNehNtGbQvtoD6Xa6poB5

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

sy22

Decoy

vinteligencia.com

displayfridges.fun

completetip.com

giallozafferrano.com

jizihao1.com

mysticheightstrail.com

fourseasonslb.com

kjnala.shop

mosiacwall.com

vandistreet.com

gracefullytouchedartistry.com

hbiwhwr.shop

mfmz.net

hrmbrillianz.com

funwarsztat.com

polewithcandy.com

ourrajasthan.com

wilhouettteamerica.com

johnnystintshop.com

asgnelwin.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3228
    • C:\Users\Admin\AppData\Local\Temp\014ed741b83b7bd4572f9fb1285ebecf658b74eb367b712614034c28b9af4845.exe
      "C:\Users\Admin\AppData\Local\Temp\014ed741b83b7bd4572f9fb1285ebecf658b74eb367b712614034c28b9af4845.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:428
      • C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe
        "C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:3932
        • C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe
          "C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:1064
    • C:\Windows\SysWOW64\msdt.exe
      "C:\Windows\SysWOW64\msdt.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3416
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe"
        3⤵
          PID:1196

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe

      Filesize

      239KB

      MD5

      b593215d7269ebf9c11ac1abafeb53ff

      SHA1

      ca95860179cbfebe22abf3768f1bd4def8467032

      SHA256

      0024814fa6775d86e0bd0606ea5c5ae1695712461b9e015f9e518c91a8bdaca5

      SHA512

      2e246b2ead441c2c7909267a5d34212d1df4546f454f566889102f38d010129ab150933504649e61caad9b703a1dcaf332f22c755681f2dfaf6603d409c7c09e

    • C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe

      Filesize

      239KB

      MD5

      b593215d7269ebf9c11ac1abafeb53ff

      SHA1

      ca95860179cbfebe22abf3768f1bd4def8467032

      SHA256

      0024814fa6775d86e0bd0606ea5c5ae1695712461b9e015f9e518c91a8bdaca5

      SHA512

      2e246b2ead441c2c7909267a5d34212d1df4546f454f566889102f38d010129ab150933504649e61caad9b703a1dcaf332f22c755681f2dfaf6603d409c7c09e

    • C:\Users\Admin\AppData\Local\Temp\bjyafpvds.exe

      Filesize

      239KB

      MD5

      b593215d7269ebf9c11ac1abafeb53ff

      SHA1

      ca95860179cbfebe22abf3768f1bd4def8467032

      SHA256

      0024814fa6775d86e0bd0606ea5c5ae1695712461b9e015f9e518c91a8bdaca5

      SHA512

      2e246b2ead441c2c7909267a5d34212d1df4546f454f566889102f38d010129ab150933504649e61caad9b703a1dcaf332f22c755681f2dfaf6603d409c7c09e

    • C:\Users\Admin\AppData\Local\Temp\jprec.ku

      Filesize

      205KB

      MD5

      67a55f970cc587520ba5c9b94514c7dc

      SHA1

      063b5013d36090be4fbdf5e1ea275660a038ab6b

      SHA256

      97fee14eff294cf8b5a09b2011df559198ada095335f7d582273422d89f7fbab

      SHA512

      54c5ce663a59a291b7e38ef0a6272954b4b740612d38cce1dc6486a7e4445bf40d37a72c65ef883ee55a10085cd807fcf28e7fbe8d36dbe02bfe47d34959250f

    • memory/1064-9-0x00000000013D0000-0x00000000016F0000-memory.dmp

      Filesize

      3.1MB

    • memory/1064-7-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1064-11-0x0000000000400000-0x000000000042F000-memory.dmp

      Filesize

      188KB

    • memory/1064-12-0x0000000000F60000-0x0000000000F74000-memory.dmp

      Filesize

      80KB

    • memory/3228-21-0x0000000006110000-0x0000000006285000-memory.dmp

      Filesize

      1.5MB

    • memory/3228-13-0x0000000006110000-0x0000000006285000-memory.dmp

      Filesize

      1.5MB

    • memory/3228-28-0x0000000002490000-0x00000000025C8000-memory.dmp

      Filesize

      1.2MB

    • memory/3228-26-0x0000000002490000-0x00000000025C8000-memory.dmp

      Filesize

      1.2MB

    • memory/3228-25-0x0000000002490000-0x00000000025C8000-memory.dmp

      Filesize

      1.2MB

    • memory/3416-15-0x0000000000D50000-0x0000000000EC3000-memory.dmp

      Filesize

      1.4MB

    • memory/3416-19-0x0000000005010000-0x0000000005330000-memory.dmp

      Filesize

      3.1MB

    • memory/3416-20-0x0000000000B20000-0x0000000000B4F000-memory.dmp

      Filesize

      188KB

    • memory/3416-18-0x0000000000B20000-0x0000000000B4F000-memory.dmp

      Filesize

      188KB

    • memory/3416-23-0x0000000004CC0000-0x0000000004D53000-memory.dmp

      Filesize

      588KB

    • memory/3416-17-0x0000000000D50000-0x0000000000EC3000-memory.dmp

      Filesize

      1.4MB

    • memory/3416-14-0x0000000000D50000-0x0000000000EC3000-memory.dmp

      Filesize

      1.4MB

    • memory/3932-5-0x00000000007B0000-0x00000000007B2000-memory.dmp

      Filesize

      8KB