Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231023-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system
  • submitted
    16/11/2023, 05:06

General

  • Target

    860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe

  • Size

    332KB

  • MD5

    5b691330acaa3c5432b9caadbeb82003

  • SHA1

    7084d84dcc45be8161bc3c044c02d02f05d46b95

  • SHA256

    860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930

  • SHA512

    dd8fb100e9d3b3d7404265c400ff1d055fc31d07f6359cfe95902045f9f48e3ca348ccce3071bc00bcca7f39a1073df45ea79381b81d697aafe6ff2ea7c765c4

  • SSDEEP

    6144:BBlL/51hWPefvD4kFdshzsQ1tmlwOctCRUDkBYz:HHTfvD4kqsQel5IZF

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

tb8i

Decoy

097jz.com

physium.net

sherwoodsubnet.com

scbaya.fun

us2048.top

danlclmn.com

starsyx.com

foxbox-digi.store

thefishermanhouse.com

salvanandcie.com

rykuruh.cfd

gelaoguan.net

petar-gojun.com

coandcompanyboutique.com

decentralizedcryptos.com

ecuajet.net

livbythebeach.com

cleaning-services-33235.bond

free-webbuilder.today

pussypower.net

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of FindShellTrayWindow 5 IoCs
  • Suspicious use of SendNotifyMessage 3 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Modifies registry class
    • Suspicious behavior: GetForegroundWindowSpam
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3260
    • C:\Users\Admin\AppData\Local\Temp\860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe
      "C:\Users\Admin\AppData\Local\Temp\860b90ba1c36e237b2aca9e77024d953e5aa3b9d4a736130d355da6c76cf0930.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4408
      • C:\Users\Admin\AppData\Local\Temp\cegsxx.exe
        "C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Users\Admin\AppData\Local\Temp\cegsxx.exe
          "C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2788
    • C:\Windows\SysWOW64\cscript.exe
      "C:\Windows\SysWOW64\cscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3092
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\cegsxx.exe"
        3⤵
          PID:4816
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" "C:\Windows\SYSTEM32\EDGEHTML.dll",#141 Microsoft.VCLibs.140.00_8wekyb3d8bbwe
      1⤵
        PID:1492
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k UnistackSvcGroup
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        PID:3364

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Comms\UnistoreDB\store.jfm

        Filesize

        16KB

        MD5

        4cc7f41cd478adeb7e50928e4644d132

        SHA1

        a47777dd6d684c8883333e9a3233839b0cd56165

        SHA256

        b08a7a092590402f05a5f6211aab0e7ceb63965e5f50bb622725fc5e97bc1040

        SHA512

        d8e97b09caabd8451c58d724c217f63c33dd83d60767e14ab5f943a4dc700b9b9a3a23ec2a2611150ea3903e871a708f2234208cbd5500c4bc7458494061be40

      • C:\Users\Admin\AppData\Local\Temp\cegsxx.exe

        Filesize

        176KB

        MD5

        0a1743cf9e74100a9fd023acf3f36e49

        SHA1

        4a7d1c28ccb0ae96ed074466ad1bdd22a2d36457

        SHA256

        5491e80a096d5f370f010e69d9aba77eb3ab49f8a259dea544106a7f4f7aad74

        SHA512

        9b4ce1bddbb32ce7fa4916cd6d7616fc9016234e4a6cfe7ddb97ffb42f5da8000dbdf5c709e0046036d72ae481c10268504243a8b09582d80845b10868aafea4

      • C:\Users\Admin\AppData\Local\Temp\cegsxx.exe

        Filesize

        176KB

        MD5

        0a1743cf9e74100a9fd023acf3f36e49

        SHA1

        4a7d1c28ccb0ae96ed074466ad1bdd22a2d36457

        SHA256

        5491e80a096d5f370f010e69d9aba77eb3ab49f8a259dea544106a7f4f7aad74

        SHA512

        9b4ce1bddbb32ce7fa4916cd6d7616fc9016234e4a6cfe7ddb97ffb42f5da8000dbdf5c709e0046036d72ae481c10268504243a8b09582d80845b10868aafea4

      • C:\Users\Admin\AppData\Local\Temp\cegsxx.exe

        Filesize

        176KB

        MD5

        0a1743cf9e74100a9fd023acf3f36e49

        SHA1

        4a7d1c28ccb0ae96ed074466ad1bdd22a2d36457

        SHA256

        5491e80a096d5f370f010e69d9aba77eb3ab49f8a259dea544106a7f4f7aad74

        SHA512

        9b4ce1bddbb32ce7fa4916cd6d7616fc9016234e4a6cfe7ddb97ffb42f5da8000dbdf5c709e0046036d72ae481c10268504243a8b09582d80845b10868aafea4

      • C:\Users\Admin\AppData\Local\Temp\zardzr.n

        Filesize

        205KB

        MD5

        94c1de70f3399bfbb9a75c90f80cb147

        SHA1

        058d4d73ba9a02ba877be7664f159c3be08a4331

        SHA256

        1db2947c6a53bb241df0b2d3fe158a3ec6fd418f8cd77b6041b8c77e520248d3

        SHA512

        9bde301e2a4d0b06a9efe7c3e87a34f094de17ea871e4025a3b2c1e8d3221884afa3dfb917578eb66bf074b34d29d5cec9c7da099dd65986ab7e18009758f2e2

      • memory/2788-7-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2788-9-0x0000000000A70000-0x0000000000DBA000-memory.dmp

        Filesize

        3.3MB

      • memory/2788-11-0x0000000000400000-0x000000000042F000-memory.dmp

        Filesize

        188KB

      • memory/2788-12-0x0000000000500000-0x0000000000514000-memory.dmp

        Filesize

        80KB

      • memory/3092-21-0x00000000027E0000-0x0000000002873000-memory.dmp

        Filesize

        588KB

      • memory/3092-15-0x0000000000100000-0x0000000000127000-memory.dmp

        Filesize

        156KB

      • memory/3092-17-0x0000000000100000-0x0000000000127000-memory.dmp

        Filesize

        156KB

      • memory/3092-18-0x00000000005C0000-0x00000000005EF000-memory.dmp

        Filesize

        188KB

      • memory/3092-19-0x00000000029A0000-0x0000000002CEA000-memory.dmp

        Filesize

        3.3MB

      • memory/3092-20-0x00000000005C0000-0x00000000005EF000-memory.dmp

        Filesize

        188KB

      • memory/3260-25-0x0000000008240000-0x0000000008393000-memory.dmp

        Filesize

        1.3MB

      • memory/3260-23-0x0000000002AB0000-0x0000000002BB0000-memory.dmp

        Filesize

        1024KB

      • memory/3260-24-0x0000000002AB0000-0x0000000002BB0000-memory.dmp

        Filesize

        1024KB

      • memory/3260-13-0x0000000008240000-0x0000000008393000-memory.dmp

        Filesize

        1.3MB

      • memory/3260-28-0x0000000002AB0000-0x0000000002BB0000-memory.dmp

        Filesize

        1024KB

      • memory/3364-69-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-72-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-65-0x0000029616F40000-0x0000029616F41000-memory.dmp

        Filesize

        4KB

      • memory/3364-66-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-67-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-68-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-49-0x000002960EA50000-0x000002960EA60000-memory.dmp

        Filesize

        64KB

      • memory/3364-70-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-71-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-33-0x000002960E950000-0x000002960E960000-memory.dmp

        Filesize

        64KB

      • memory/3364-73-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-74-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-75-0x0000029616F60000-0x0000029616F61000-memory.dmp

        Filesize

        4KB

      • memory/3364-76-0x0000029616C90000-0x0000029616C91000-memory.dmp

        Filesize

        4KB

      • memory/3364-77-0x0000029616C80000-0x0000029616C81000-memory.dmp

        Filesize

        4KB

      • memory/3364-79-0x0000029616C90000-0x0000029616C91000-memory.dmp

        Filesize

        4KB

      • memory/3364-82-0x0000029616C80000-0x0000029616C81000-memory.dmp

        Filesize

        4KB

      • memory/3364-85-0x0000029616BC0000-0x0000029616BC1000-memory.dmp

        Filesize

        4KB

      • memory/4228-5-0x00000000004C0000-0x00000000004C2000-memory.dmp

        Filesize

        8KB