Analysis

  • max time kernel
    146s
  • max time network
    145s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240704-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system
  • submitted
    05/07/2024, 01:12

General

  • Target

    privola za obradu osobnih podataka gdpr ps.pdf.exe

  • Size

    812KB

  • MD5

    a4026dc6018bd222aa7a0689e207d932

  • SHA1

    9d54abcae294cfd6b0a85bf947152e22f7d0fa61

  • SHA256

    625130699fe1aa219415781e36e31e6b853753124d8da766f1a76c02614c0761

  • SHA512

    96605220fc263c5604bddde6aaaa793797c176bae0f5a6882aa52df9b9d24c237c38cae5596001e85c7483704aabaa4f5bacacdadc81e19eadea876ca3503a9c

  • SSDEEP

    12288:Xw3lHEHoA0ugbmIU4p2FARHDCjAp2mH99khlpZ+fg1B8cpPaVQbkR:+lm0qhFAJ+jp899kFF1B8iaG+

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

dn03

Decoy

almouranipainting.com

cataloguia.shop

zaparielectric.com

whcqsc.com

ioco.in

aduredmond.com

vavada611a.fun

humtivers.com

jewellerytml.com

mcapitalparticipacoes.com

inhlcq.shop

solanamall.xyz

moviepropgroup.com

thegenesis.ltd

cyberxdefend.com

skinbykoco.com

entermintlead.com

honestaireviews.com

wyclhj7gqfustzp.buzz

w937xb.com

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 24 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3464
    • C:\Users\Admin\AppData\Local\Temp\privola za obradu osobnih podataka gdpr ps.pdf.exe
      "C:\Users\Admin\AppData\Local\Temp\privola za obradu osobnih podataka gdpr ps.pdf.exe"
      2⤵
      • Checks computer location settings
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:4460
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\privola za obradu osobnih podataka gdpr ps.pdf.exe"
        3⤵
        • Command and Scripting Interpreter: PowerShell
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3948
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
        3⤵
          PID:4536
        • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
          "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
          3⤵
            PID:2972
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            3⤵
              PID:4464
            • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
              "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              3⤵
              • Suspicious use of SetThreadContext
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              PID:4684
          • C:\Windows\SysWOW64\explorer.exe
            "C:\Windows\SysWOW64\explorer.exe"
            2⤵
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:5032
            • C:\Windows\SysWOW64\cmd.exe
              /c del "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
              3⤵
                PID:3020

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_gxqz21et.sck.ps1

            Filesize

            60B

            MD5

            d17fe0a3f47be24a6453e9ef58c94641

            SHA1

            6ab83620379fc69f80c0242105ddffd7d98d5d9d

            SHA256

            96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

            SHA512

            5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

          • memory/3464-24-0x0000000002940000-0x0000000002A3C000-memory.dmp

            Filesize

            1008KB

          • memory/3464-75-0x0000000006E20000-0x0000000006EEA000-memory.dmp

            Filesize

            808KB

          • memory/3464-72-0x0000000002940000-0x0000000002A3C000-memory.dmp

            Filesize

            1008KB

          • memory/3948-55-0x0000000007170000-0x0000000007213000-memory.dmp

            Filesize

            652KB

          • memory/3948-57-0x0000000007280000-0x000000000729A000-memory.dmp

            Filesize

            104KB

          • memory/3948-67-0x00000000075A0000-0x00000000075A8000-memory.dmp

            Filesize

            32KB

          • memory/3948-66-0x00000000075C0000-0x00000000075DA000-memory.dmp

            Filesize

            104KB

          • memory/3948-65-0x00000000074C0000-0x00000000074D4000-memory.dmp

            Filesize

            80KB

          • memory/3948-64-0x00000000074B0000-0x00000000074BE000-memory.dmp

            Filesize

            56KB

          • memory/3948-63-0x0000000007480000-0x0000000007491000-memory.dmp

            Filesize

            68KB

          • memory/3948-62-0x0000000007500000-0x0000000007596000-memory.dmp

            Filesize

            600KB

          • memory/3948-58-0x00000000072F0000-0x00000000072FA000-memory.dmp

            Filesize

            40KB

          • memory/3948-32-0x0000000005980000-0x00000000059E6000-memory.dmp

            Filesize

            408KB

          • memory/3948-15-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

            Filesize

            4KB

          • memory/3948-17-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

            Filesize

            64KB

          • memory/3948-37-0x0000000005AF0000-0x0000000005E44000-memory.dmp

            Filesize

            3.3MB

          • memory/3948-18-0x0000000002620000-0x0000000002656000-memory.dmp

            Filesize

            216KB

          • memory/3948-23-0x0000000005200000-0x0000000005828000-memory.dmp

            Filesize

            6.2MB

          • memory/3948-56-0x00000000078C0000-0x0000000007F3A000-memory.dmp

            Filesize

            6.5MB

          • memory/3948-38-0x0000000005F50000-0x0000000005F6E000-memory.dmp

            Filesize

            120KB

          • memory/3948-20-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

            Filesize

            64KB

          • memory/3948-54-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

            Filesize

            64KB

          • memory/3948-30-0x0000000005190000-0x00000000051B2000-memory.dmp

            Filesize

            136KB

          • memory/3948-53-0x0000000004BC0000-0x0000000004BD0000-memory.dmp

            Filesize

            64KB

          • memory/3948-31-0x00000000058A0000-0x0000000005906000-memory.dmp

            Filesize

            408KB

          • memory/3948-42-0x0000000070B10000-0x0000000070B5C000-memory.dmp

            Filesize

            304KB

          • memory/3948-41-0x0000000006520000-0x0000000006552000-memory.dmp

            Filesize

            200KB

          • memory/3948-52-0x0000000006560000-0x000000000657E000-memory.dmp

            Filesize

            120KB

          • memory/3948-39-0x0000000005FA0000-0x0000000005FEC000-memory.dmp

            Filesize

            304KB

          • memory/3948-40-0x000000007EED0000-0x000000007EEE0000-memory.dmp

            Filesize

            64KB

          • memory/4460-7-0x0000000007470000-0x000000000748A000-memory.dmp

            Filesize

            104KB

          • memory/4460-5-0x0000000074C50000-0x0000000075400000-memory.dmp

            Filesize

            7.7MB

          • memory/4460-3-0x0000000005710000-0x00000000057A2000-memory.dmp

            Filesize

            584KB

          • memory/4460-4-0x00000000057D0000-0x00000000057DA000-memory.dmp

            Filesize

            40KB

          • memory/4460-1-0x0000000000CB0000-0x0000000000D7E000-memory.dmp

            Filesize

            824KB

          • memory/4460-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

            Filesize

            4KB

          • memory/4460-2-0x0000000005DD0000-0x0000000006374000-memory.dmp

            Filesize

            5.6MB

          • memory/4460-14-0x0000000074C50000-0x0000000075400000-memory.dmp

            Filesize

            7.7MB

          • memory/4460-6-0x00000000068B0000-0x0000000006DDC000-memory.dmp

            Filesize

            5.2MB

          • memory/4460-11-0x0000000010430000-0x00000000104CC000-memory.dmp

            Filesize

            624KB

          • memory/4460-10-0x000000000CD30000-0x000000000CDA6000-memory.dmp

            Filesize

            472KB

          • memory/4460-8-0x0000000005DC0000-0x0000000005DC8000-memory.dmp

            Filesize

            32KB

          • memory/4460-9-0x00000000068A0000-0x00000000068AC000-memory.dmp

            Filesize

            48KB

          • memory/4684-12-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/4684-16-0x0000000000FA0000-0x00000000012EA000-memory.dmp

            Filesize

            3.3MB

          • memory/4684-22-0x0000000000F80000-0x0000000000F94000-memory.dmp

            Filesize

            80KB

          • memory/4684-21-0x0000000000400000-0x000000000042F000-memory.dmp

            Filesize

            188KB

          • memory/5032-61-0x0000000000BB0000-0x0000000000FE3000-memory.dmp

            Filesize

            4.2MB

          • memory/5032-59-0x0000000000BB0000-0x0000000000FE3000-memory.dmp

            Filesize

            4.2MB

          • memory/5032-69-0x0000000000870000-0x000000000089F000-memory.dmp

            Filesize

            188KB