Analysis

  • max time kernel
    145s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240215-en
  • resource tags

    arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system
  • submitted
    18-05-2024 13:30

General

  • Target

    SHIPPING_DOC_PL_INV_BL_PDA_005958883_pdf.exe

  • Size

    310KB

  • MD5

    22a178e0f16637e45909a3dae9b8d623

  • SHA1

    3965ecc692c69659bbf7b788060ccbe43b27c9be

  • SHA256

    c78a0839956fc39357c153f175811edfc50835093387322e4639156ab1aeb701

  • SHA512

    cbf71fbbaa9817c0ba29bb549590f3e381319ca3bca30c900b3325c141ad8f31ca4ea7b48fdbc9846258a3077005b11e1c56da8fd82bd366d507806f36269d4e

  • SSDEEP

    6144:gacs8c4h9UYI7c8MWCFVaXAs/jiB1fXzW8Qf4QiiIJw:g68cgUYIY81CXaXAs/eB1/iFb2w

Malware Config

Extracted

Family

formbook

Version

3.8

Campaign

o7

Decoy

detob.com

disneypanda.win

shawsgroupltd.com

phimdan.com

xn--mbt827f11c9wf.com

smartlifestylechange.com

gposrq.men

dhdba.com

elixir-floral-ischtar.com

swarm4you.info

planet-saving-expert.net

xdancex.com

maqax.com

bn24.news

lebensstil.store

epilcolor.com

louzanfashion.online

natgeocolorwild.info

zemunci.com

xn--qvr67wu7olvg.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 28 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1216
    • C:\Users\Admin\AppData\Local\Temp\SHIPPING_DOC_PL_INV_BL_PDA_005958883_pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\SHIPPING_DOC_PL_INV_BL_PDA_005958883_pdf.exe"
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2800
      • C:\Users\Admin\AppData\Roaming\app.exe
        "C:\Users\Admin\AppData\Roaming\app.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1668
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
          4⤵
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of AdjustPrivilegeToken
          PID:2752
    • C:\Windows\SysWOW64\autofmt.exe
      "C:\Windows\SysWOW64\autofmt.exe"
      2⤵
        PID:2656
      • C:\Windows\SysWOW64\autofmt.exe
        "C:\Windows\SysWOW64\autofmt.exe"
        2⤵
          PID:2692
        • C:\Windows\SysWOW64\autofmt.exe
          "C:\Windows\SysWOW64\autofmt.exe"
          2⤵
            PID:2644
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\SysWOW64\cmd.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:2448
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v2.0.50727\AppLaunch.exe"
              3⤵
                PID:2528

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • \Users\Admin\AppData\Roaming\app.exe

            Filesize

            310KB

            MD5

            22a178e0f16637e45909a3dae9b8d623

            SHA1

            3965ecc692c69659bbf7b788060ccbe43b27c9be

            SHA256

            c78a0839956fc39357c153f175811edfc50835093387322e4639156ab1aeb701

            SHA512

            cbf71fbbaa9817c0ba29bb549590f3e381319ca3bca30c900b3325c141ad8f31ca4ea7b48fdbc9846258a3077005b11e1c56da8fd82bd366d507806f36269d4e

          • memory/1668-12-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB

          • memory/1668-10-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB

          • memory/1668-11-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB

          • memory/1668-17-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB

          • memory/2448-19-0x000000004A780000-0x000000004A7CC000-memory.dmp

            Filesize

            304KB

          • memory/2752-14-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/2752-15-0x0000000001F40000-0x0000000002243000-memory.dmp

            Filesize

            3.0MB

          • memory/2752-18-0x0000000000400000-0x000000000042A000-memory.dmp

            Filesize

            168KB

          • memory/2800-2-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB

          • memory/2800-1-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB

          • memory/2800-0-0x00000000747B1000-0x00000000747B2000-memory.dmp

            Filesize

            4KB

          • memory/2800-13-0x00000000747B0000-0x0000000074D5B000-memory.dmp

            Filesize

            5.7MB