Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    03/01/2024, 07:15

General

  • Target

    КОММЕРЧЕСКИЙ ПОСТАВЩИК.exe

  • Size

    646KB

  • MD5

    a48a58a847addb1ee3568eabf32b1b9d

  • SHA1

    6bbeec62a240953cffc1a084ea59141a1368600a

  • SHA256

    7b9502c277114c4c5cde1d0ce893041f2a880ce2808855ec74faf47485660d51

  • SHA512

    78cd13f36a0b61bfd4f13401673efd071a6d80da9d27e8988179063182a73a42645a35b1daf30d89856b633a8984172a41dddbcbe884afd2f6626fb16790d19e

  • SSDEEP

    12288:D7Ob4wOCsw0POWu11FDLB3yT+rPbVvYmh20XchGycysYUs1uE5z12H:DGOCsNuJN/z5vYmh2Cc

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

gy14

Decoy

mavbam.com

theanhedonia.com

budgetnurseries.com

buflitr.com

alqamarhotel.com

2660348.top

123bu6.shop

v72999.com

yzyz841.xyz

247fracing.com

naples.beauty

twinklethrive.com

loscaseros.com

creditspisatylegko.site

sgyy3ej2dgwesb5.com

ufocafe.net

techn9nehollywoodundead.com

truedatalab.com

alterdpxlmarketing.com

harborspringsfire.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 4 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of UnmapMainImage 1 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\КОММЕРЧЕСКИЙ ПОСТАВЩИК.exe
    "C:\Users\Admin\AppData\Local\Temp\КОММЕРЧЕСКИЙ ПОСТАВЩИК.exe"
    1⤵
    • Checks computer location settings
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2128
    • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
      "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      PID:4596
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\wNCDjTroeD" /XML "C:\Users\Admin\AppData\Local\Temp\tmp9191.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:3880
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\wNCDjTroeD.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2756
  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of UnmapMainImage
    • Suspicious use of WriteProcessMemory
    PID:3492
    • C:\Windows\SysWOW64\control.exe
      "C:\Windows\SysWOW64\control.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4488
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:2232

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/2128-26-0x00000000744E0000-0x0000000074C90000-memory.dmp

            Filesize

            7.7MB

          • memory/2128-0-0x00000000744E0000-0x0000000074C90000-memory.dmp

            Filesize

            7.7MB

          • memory/2128-3-0x0000000007E30000-0x0000000007EC2000-memory.dmp

            Filesize

            584KB

          • memory/2128-4-0x0000000007F70000-0x0000000007F80000-memory.dmp

            Filesize

            64KB

          • memory/2128-5-0x0000000007E00000-0x0000000007E0A000-memory.dmp

            Filesize

            40KB

          • memory/2128-6-0x0000000008090000-0x000000000812C000-memory.dmp

            Filesize

            624KB

          • memory/2128-2-0x0000000008340000-0x00000000088E4000-memory.dmp

            Filesize

            5.6MB

          • memory/2128-7-0x0000000007F10000-0x0000000007F22000-memory.dmp

            Filesize

            72KB

          • memory/2128-8-0x0000000003340000-0x000000000334E000-memory.dmp

            Filesize

            56KB

          • memory/2128-9-0x00000000093A0000-0x000000000940E000-memory.dmp

            Filesize

            440KB

          • memory/2128-1-0x0000000000EC0000-0x0000000000F68000-memory.dmp

            Filesize

            672KB

          • memory/2128-20-0x00000000744E0000-0x0000000074C90000-memory.dmp

            Filesize

            7.7MB

          • memory/2128-22-0x0000000007F70000-0x0000000007F80000-memory.dmp

            Filesize

            64KB

          • memory/2756-17-0x00000000744E0000-0x0000000074C90000-memory.dmp

            Filesize

            7.7MB

          • memory/2756-60-0x00000000081C0000-0x000000000883A000-memory.dmp

            Filesize

            6.5MB

          • memory/2756-31-0x0000000006180000-0x00000000061E6000-memory.dmp

            Filesize

            408KB

          • memory/2756-42-0x0000000006360000-0x00000000066B4000-memory.dmp

            Filesize

            3.3MB

          • memory/2756-34-0x00000000061F0000-0x0000000006256000-memory.dmp

            Filesize

            408KB

          • memory/2756-71-0x00000000744E0000-0x0000000074C90000-memory.dmp

            Filesize

            7.7MB

          • memory/2756-43-0x0000000006850000-0x000000000686E000-memory.dmp

            Filesize

            120KB

          • memory/2756-44-0x00000000068A0000-0x00000000068EC000-memory.dmp

            Filesize

            304KB

          • memory/2756-65-0x0000000007DB0000-0x0000000007DBE000-memory.dmp

            Filesize

            56KB

          • memory/2756-67-0x0000000007EC0000-0x0000000007EDA000-memory.dmp

            Filesize

            104KB

          • memory/2756-68-0x0000000007EA0000-0x0000000007EA8000-memory.dmp

            Filesize

            32KB

          • memory/2756-21-0x0000000005460000-0x0000000005470000-memory.dmp

            Filesize

            64KB

          • memory/2756-66-0x0000000007DC0000-0x0000000007DD4000-memory.dmp

            Filesize

            80KB

          • memory/2756-18-0x0000000005460000-0x0000000005470000-memory.dmp

            Filesize

            64KB

          • memory/2756-14-0x00000000052B0000-0x00000000052E6000-memory.dmp

            Filesize

            216KB

          • memory/2756-16-0x0000000005AA0000-0x00000000060C8000-memory.dmp

            Filesize

            6.2MB

          • memory/2756-59-0x0000000007A90000-0x0000000007B33000-memory.dmp

            Filesize

            652KB

          • memory/2756-58-0x0000000005460000-0x0000000005470000-memory.dmp

            Filesize

            64KB

          • memory/2756-57-0x0000000006E00000-0x0000000006E1E000-memory.dmp

            Filesize

            120KB

          • memory/2756-61-0x0000000007B80000-0x0000000007B9A000-memory.dmp

            Filesize

            104KB

          • memory/2756-62-0x0000000007BF0000-0x0000000007BFA000-memory.dmp

            Filesize

            40KB

          • memory/2756-27-0x0000000005980000-0x00000000059A2000-memory.dmp

            Filesize

            136KB

          • memory/2756-47-0x00000000709D0000-0x0000000070A1C000-memory.dmp

            Filesize

            304KB

          • memory/2756-63-0x0000000007E00000-0x0000000007E96000-memory.dmp

            Filesize

            600KB

          • memory/2756-64-0x0000000007D80000-0x0000000007D91000-memory.dmp

            Filesize

            68KB

          • memory/2756-46-0x0000000007A50000-0x0000000007A82000-memory.dmp

            Filesize

            200KB

          • memory/2756-45-0x000000007F2A0000-0x000000007F2B0000-memory.dmp

            Filesize

            64KB

          • memory/3492-30-0x0000000007F30000-0x00000000080D4000-memory.dmp

            Filesize

            1.6MB

          • memory/3492-84-0x0000000008AE0000-0x0000000008BEF000-memory.dmp

            Filesize

            1.1MB

          • memory/3492-81-0x0000000008AE0000-0x0000000008BEF000-memory.dmp

            Filesize

            1.1MB

          • memory/3492-80-0x0000000008AE0000-0x0000000008BEF000-memory.dmp

            Filesize

            1.1MB

          • memory/4488-76-0x0000000000FA0000-0x0000000000FCF000-memory.dmp

            Filesize

            188KB

          • memory/4488-73-0x00000000008B0000-0x00000000008D7000-memory.dmp

            Filesize

            156KB

          • memory/4488-74-0x0000000000FA0000-0x0000000000FCF000-memory.dmp

            Filesize

            188KB

          • memory/4488-72-0x00000000008B0000-0x00000000008D7000-memory.dmp

            Filesize

            156KB

          • memory/4488-75-0x0000000003150000-0x000000000349A000-memory.dmp

            Filesize

            3.3MB

          • memory/4488-78-0x0000000002EC0000-0x0000000002F54000-memory.dmp

            Filesize

            592KB

          • memory/4596-19-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4596-29-0x0000000001150000-0x0000000001165000-memory.dmp

            Filesize

            84KB

          • memory/4596-28-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4596-24-0x0000000001600000-0x000000000194A000-memory.dmp

            Filesize

            3.3MB