Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 10:00

General

  • Target

    tmp3laph0nn.exe

  • Size

    606KB

  • MD5

    2fa129c7224ce25ad5f60e88eec7b371

  • SHA1

    e1942614c29c0c060c0ccbda2f798a894bcd4a9c

  • SHA256

    f754f346d15cc240a990e20e92ab7bd1a0193543aef5b5fc5562306e2593ed5f

  • SHA512

    3969e7a0bebfa1a4fe955a3314f16b152f0d6b317656543dd7f9abd3a45b44dbe190ae419ad0580c42e8317b5d422c5693aac4be8e4efd4f460254ebb8ac9b3c

  • SSDEEP

    12288:2tKPYyVFvf7ckA4aS4reE3w5uRbah33bw4CbKgXdDo8pfFH2HytA:24g+Foi6wAK30nbhV2i

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

pf06

Decoy

mogu829.store

kjhcvjbjer.asia

kokombeverage.com

spaycrop.com

pennsylvaniaautosales.com

cqdjyw.com

attendlimitlessarena.com

dominicbyrd.com

dkds.net

ematransform.com

faceshopping.one

iqmal.dev

ivanrgonzalez.com

ickfullmoon.com

dirtyshirtspro.com

stopinflationtax.com

sidbaskaran.com

szroadtech.com

clickvenda.store

cckkkl.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 52 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe
      "C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:3680
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\cJceVmCU.exe"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3752
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\cJceVmCU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp245C.tmp"
        3⤵
        • Creates scheduled task(s)
        PID:2144
      • C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe
        "C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"
        3⤵
        • Suspicious use of SetThreadContext
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: MapViewOfSection
        • Suspicious use of AdjustPrivilegeToken
        PID:3236
    • C:\Windows\SysWOW64\wscript.exe
      "C:\Windows\SysWOW64\wscript.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1616
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Local\Temp\tmp3laph0nn.exe"
        3⤵
          PID:4272
      • C:\Windows\SysWOW64\autochk.exe
        "C:\Windows\SysWOW64\autochk.exe"
        2⤵
          PID:2868
        • C:\Windows\SysWOW64\autochk.exe
          "C:\Windows\SysWOW64\autochk.exe"
          2⤵
            PID:1860
          • C:\Windows\SysWOW64\autochk.exe
            "C:\Windows\SysWOW64\autochk.exe"
            2⤵
              PID:3756

          Network

                MITRE ATT&CK Enterprise v15

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_egkklxvw.eho.ps1

                  Filesize

                  60B

                  MD5

                  d17fe0a3f47be24a6453e9ef58c94641

                  SHA1

                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                  SHA256

                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                  SHA512

                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                • C:\Users\Admin\AppData\Local\Temp\tmp245C.tmp

                  Filesize

                  1KB

                  MD5

                  e99c8753f4a8342b90923d6b506e963b

                  SHA1

                  6c009a04decdeb0d549d6af2f7792f0bd278d647

                  SHA256

                  83646ff87c98a7c9ae062d41ae6175a9a4d76fe69454a91bdef202cb7c107955

                  SHA512

                  0981e24ee7ae8278797349645646da221824f3dfcaa213b523751f60c25ca97db3798d5af5a1e20f2e3a0c820eecadf6f28b3b553675fa48c40107572e235925

                • memory/1616-80-0x0000000002D30000-0x0000000002DC4000-memory.dmp

                  Filesize

                  592KB

                • memory/1616-46-0x0000000000470000-0x0000000000497000-memory.dmp

                  Filesize

                  156KB

                • memory/1616-71-0x0000000000E00000-0x0000000000E2F000-memory.dmp

                  Filesize

                  188KB

                • memory/1616-48-0x0000000000E00000-0x0000000000E2F000-memory.dmp

                  Filesize

                  188KB

                • memory/1616-51-0x0000000002F40000-0x000000000328A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/1616-45-0x0000000000470000-0x0000000000497000-memory.dmp

                  Filesize

                  156KB

                • memory/3236-38-0x00000000018C0000-0x0000000001C0A000-memory.dmp

                  Filesize

                  3.3MB

                • memory/3236-40-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/3236-24-0x0000000000400000-0x000000000042F000-memory.dmp

                  Filesize

                  188KB

                • memory/3236-41-0x00000000015D0000-0x00000000015E5000-memory.dmp

                  Filesize

                  84KB

                • memory/3512-42-0x0000000008730000-0x000000000889C000-memory.dmp

                  Filesize

                  1.4MB

                • memory/3512-89-0x00000000032D0000-0x000000000337B000-memory.dmp

                  Filesize

                  684KB

                • memory/3512-81-0x0000000008730000-0x000000000889C000-memory.dmp

                  Filesize

                  1.4MB

                • memory/3512-86-0x00000000032D0000-0x000000000337B000-memory.dmp

                  Filesize

                  684KB

                • memory/3512-85-0x00000000032D0000-0x000000000337B000-memory.dmp

                  Filesize

                  684KB

                • memory/3680-7-0x0000000005660000-0x0000000005672000-memory.dmp

                  Filesize

                  72KB

                • memory/3680-0-0x0000000074F10000-0x00000000756C0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3680-12-0x0000000006AF0000-0x0000000006B5E000-memory.dmp

                  Filesize

                  440KB

                • memory/3680-10-0x00000000067B0000-0x00000000067B8000-memory.dmp

                  Filesize

                  32KB

                • memory/3680-11-0x00000000067C0000-0x00000000067CA000-memory.dmp

                  Filesize

                  40KB

                • memory/3680-9-0x0000000005200000-0x0000000005210000-memory.dmp

                  Filesize

                  64KB

                • memory/3680-36-0x0000000074F10000-0x00000000756C0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3680-8-0x0000000074F10000-0x00000000756C0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3680-6-0x00000000054B0000-0x000000000554C000-memory.dmp

                  Filesize

                  624KB

                • memory/3680-5-0x0000000005400000-0x000000000540A000-memory.dmp

                  Filesize

                  40KB

                • memory/3680-4-0x0000000005200000-0x0000000005210000-memory.dmp

                  Filesize

                  64KB

                • memory/3680-3-0x0000000005230000-0x00000000052C2000-memory.dmp

                  Filesize

                  584KB

                • memory/3680-2-0x00000000057E0000-0x0000000005D84000-memory.dmp

                  Filesize

                  5.6MB

                • memory/3680-1-0x00000000007B0000-0x000000000084E000-memory.dmp

                  Filesize

                  632KB

                • memory/3752-18-0x0000000074F10000-0x00000000756C0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3752-44-0x0000000006BB0000-0x0000000006BFC000-memory.dmp

                  Filesize

                  304KB

                • memory/3752-47-0x0000000074F10000-0x00000000756C0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3752-43-0x0000000006B00000-0x0000000006B1E000-memory.dmp

                  Filesize

                  120KB

                • memory/3752-49-0x00000000030F0000-0x0000000003100000-memory.dmp

                  Filesize

                  64KB

                • memory/3752-50-0x00000000030F0000-0x0000000003100000-memory.dmp

                  Filesize

                  64KB

                • memory/3752-37-0x00000000065D0000-0x0000000006924000-memory.dmp

                  Filesize

                  3.3MB

                • memory/3752-52-0x000000007F350000-0x000000007F360000-memory.dmp

                  Filesize

                  64KB

                • memory/3752-53-0x0000000007060000-0x0000000007092000-memory.dmp

                  Filesize

                  200KB

                • memory/3752-54-0x00000000757A0000-0x00000000757EC000-memory.dmp

                  Filesize

                  304KB

                • memory/3752-64-0x0000000007040000-0x000000000705E000-memory.dmp

                  Filesize

                  120KB

                • memory/3752-65-0x0000000007CA0000-0x0000000007D43000-memory.dmp

                  Filesize

                  652KB

                • memory/3752-66-0x00000000083F0000-0x0000000008A6A000-memory.dmp

                  Filesize

                  6.5MB

                • memory/3752-67-0x0000000007DB0000-0x0000000007DCA000-memory.dmp

                  Filesize

                  104KB

                • memory/3752-68-0x0000000007E20000-0x0000000007E2A000-memory.dmp

                  Filesize

                  40KB

                • memory/3752-69-0x0000000008030000-0x00000000080C6000-memory.dmp

                  Filesize

                  600KB

                • memory/3752-70-0x0000000007FB0000-0x0000000007FC1000-memory.dmp

                  Filesize

                  68KB

                • memory/3752-25-0x00000000062A0000-0x0000000006306000-memory.dmp

                  Filesize

                  408KB

                • memory/3752-72-0x0000000007FE0000-0x0000000007FEE000-memory.dmp

                  Filesize

                  56KB

                • memory/3752-73-0x0000000007FF0000-0x0000000008004000-memory.dmp

                  Filesize

                  80KB

                • memory/3752-74-0x00000000080F0000-0x000000000810A000-memory.dmp

                  Filesize

                  104KB

                • memory/3752-75-0x00000000080D0000-0x00000000080D8000-memory.dmp

                  Filesize

                  32KB

                • memory/3752-78-0x0000000074F10000-0x00000000756C0000-memory.dmp

                  Filesize

                  7.7MB

                • memory/3752-23-0x0000000006140000-0x00000000061A6000-memory.dmp

                  Filesize

                  408KB

                • memory/3752-21-0x0000000005A50000-0x0000000005A72000-memory.dmp

                  Filesize

                  136KB

                • memory/3752-20-0x0000000005B10000-0x0000000006138000-memory.dmp

                  Filesize

                  6.2MB

                • memory/3752-19-0x00000000030F0000-0x0000000003100000-memory.dmp

                  Filesize

                  64KB

                • memory/3752-17-0x0000000002FD0000-0x0000000003006000-memory.dmp

                  Filesize

                  216KB